Tuesday, January 28, 2020

Internet Censorship Essay Example for Free

Internet Censorship Essay WebInternet censorship (Is it possible to keep children safe from potential internet dangers? ) by: Eko Setiyo Utomo The Internet has become a part of modern life style for most people. In developed countries, most people use the internet at home. Children can access the internet for everything, from playing games, to doing schoolwork, to chatting with friends via e-mail, to surfing the web. Most online services provide children with a vast range of resources such as encyclopedias, current events coverage, and access to libraries and other valuable material. However, there can be real risks and dangers for an unsupervised child because most materials on the Internet are not only uncensored but also unedited. Adults can be expected to make their own evaluations of what they find. Children, who lack experience and knowledge, can not do this. Strohm (n. d. ) claims that the essential issue in the internet is internet pornography, which is a topic debated by many experts, but many other issues dangerous to children are of concern too. Children who have access to the internet can easily be lured into something dangerous. As stated by Manista (2002), â€Å"censorship on the internet has become an issue for a number of very specific reasons†. Parents should not assume that their children are safe online from internet dangers; and they should not just rely on soft ware to protect their children. According to Schwartz (2004), using filters to block access to undesirable materials may never prove to be the solution. In addition, governments should have the power to decide what is not acceptable for the minds of children. In contrast, it is argued by some people that supervising access to the internet could limit the creativity of children. n addition, according to Males (2000), statistical evidence does not support to filter the internet. He describes that several kinds of sex offences has declined since period internet (1990s) access in America. This essay will investigate the unsuitable nature of much of the material on the internet for children. It will also examine the devastating and lasting e ffect of pornographic images on children. Thus, parents must play a key role to keep children safe from potential internet dangers. Finally, it will suggest that parents should teach children how to choose suitable materials on the internet. The first section of this essay will explain why internet pornography and some of the various resources unsuitable for children can have a harmful effect on children. The next section will maintain that soft ware is essential to protect children from site danger. Finally, this essay will argue that parents themselves should be aware of the dangers on the internet. It is important to recognize that pornographic images on the internet can have a devastating and lasting effect on children. Children using the internet unsupervised can view free pornography pictures through accidental accessing. Strohm (n. d. ) has claimed that it is a commonly held belief that pornography on the Internet presents a serious danger to children online, and that the effects of pornography are progressive and addictive for many people. He further points out that most pornography sites are very easy to find. These sites always invite children and teens to take part in exposure. Children using internet chat rooms are the main target of sexual predators, often with traumatic results (Nuss 1999). Pornography isnt the only thing parents dont want their children to see on the Internet. Parents are also concerned about anarchist, Neo-Nazi, and all sorts of other propaganda, as well as information on computer hacking and building explosives. There are hundreds of thousands of web sites promoting illicit activities. However, many individuals and organized groups at the same time are attempting to protect children from information on homosexuality, violence, drugs and alcohol, hate speech, and the environment. In addition, according to Males (2000), children can become victims of internet crime, such as pedophile contacts with children and child pornography distribution. It is possible that some children may be visiting internet sites and communicating with potential internet predators without parent know. Otherwise, some pornographers argue, â€Å"In the right hands porn has its place. As anyone in the industry will readily proclaim, millions of men and women enjoy Web erotica harmlessly, and some couples turn to porn to enhance their sex lives† (Jerome et al. 2004). Children may have the opportunity to become informed about adult lifestyle. Pornography materials on the internet or ther media can be a valuable educational tool for children to understand about the concept of sexuality (Reisman Ray 1999). Furthermore, according to Males (2000), the internet access period (1990s) does not seem to have brought about any particularly bad effects. Nonetheless, children have access to computers and the internet not only at home, but in many other places, what they choose to view is very difficult to control. It is a concern of many parents that fre edom of information presented by the internet can pollute their main of children. Many kinds of methods have been implemented to avoid some of these negative effects of the internet. First of all, School on the Web†, for example, is a program has been developed by Microsoft and MCI to assist many schools attending information about education world on the internet. Moreover, Cyber Patrol, a popular soft ware, is a soft ware program that contains a twofold filtering technique. It can block unsuitable sites from a list of restricted web addresses (Reeks 2005).. Others products are Bess/N2H2, CyberSnoop, I-Gear, Internet Filter, Library Channel, NetShepherd. On Guard, Parental Discretion, Rated-PG, SmartFilter, Tattle-Tale, WebSense, and X-Stop. These soft ware are designed to present at one or more many kinds of computers. According to Schrader (1999), these products offer five basic approaches bad word, bad site, bad topic, site content rating systems and bad service to control expressive content on the internet which may be set by the individual user or built into the program. In addition, children using the internet can also be prevented from disclosing their personal details via e-mail or chat room with the application of soft ware, such as Net Nanny. Meanwhile, The Platforms for Internet Content Selection (PICS) provides particular-labeling vocabularies, which work in different way to filter, to block inappropriate materials. According to Resnick and Miller (1996) the parent, as a user, can select every material in the certain label that is provided by software to block unsuitable sites. Nevertheless, it is an impossible task to be able to censor everything on the internet because the internet is an infinite global network. Males (2000) maintains that the internet would be a useless tool for students if it is blocked, or filtered. Filters can easily block student out of websites that they need to access for research simply because they contain words that have been flagged as inappropriate. He also believes that People who worry about the internet have a phobia or anxiety disorder which is not concerned about real problems. However, using appropriate soft ware can help to minimize the negative effects of the internet, even if many weaknesses exist in various software. Parents can play a key role in helping young people to be aware of the dangers and can get practical help on keeping children safe online. Governments especially, which have the power to decide what is not acceptable for the eyes of children, should make many regulations to help parents to keep children safe from potential internet danger. In late 1999, the Australian Government established NetAlert to provide independent advice and education on managing access to and usage of the Internet (NetAlert 2005). First of all, parents need to build trusting relationships with children and set a good example. Most parents teach their children not to give out information to strangers, not to open the door if they are home alone (AACAP 1997). As a result, it is hopped that children never give their name, phone number, e-mail address, password, postal address, school, or picture without their parent permission. Furthermore, parents should also teach children how to search and find many materials that are suitable for young people (in Healey ed. 2002). Parents are strongly encouraged to speak openly with their children about online dangers and monitor their online activities. Moreover, it is important for parents to be aware that they can not assume that their child will be protected by the supervision or regulation provided by the online services. Only parents can judge when a young person is mature enough to access the internet. Nuss (1999) also claims that children will be much safer accessing the internet if parents take the time to learn to use the internet first. However, children often feel that as Internet users, they know how to make a decision about what materials are harmful. Moreover, when students are exploring the Net for different kinds of materials, they are essentially exploring the real world (Singhal 1997). The internet is one of the contexts in which young people can discover themselves, what is normal and abnormal in their behavior (in Healey ed. 002). However, because most children do not understand what materials on the internet are real or just imagined, parents should not trust children to use the internet without supervision. In conclusion, the internet is a valuable tool for assisting in the education of children. However, when children are online, they can easily be lured into something dangerous. Children have access to online information that promotes hate, violence and pornography. These can influence their behavior and even be harmful. Filter soft ware is the most effective way to protect children from inappropriate materials on the internet. Therefore, parents, who play a key role, should talk to their children about what is online and what might happen online. Finally, the government should use its power to control those sites that provide unsuitable material for young people.

Monday, January 20, 2020

Essay --

Through the various events in The Adventures of Huckleberry Finn, Mark Twain presents the life of a young, adventurous character named Huck. This interesting character embarks on the Mississippi River through the novel along with a runaway slave named Jim. The Mississippi River serves as symbols of protection, retreat from society, and Huck's true morality. In The Adventures of Huckleberry Finn, Mark Twain contrasts life on water to life on land through Huckleberry's experiences. Mark Twain uses the Mississippi River as a symbol showing protection from danger. Several instances in The Adventures of Huckleberry Finn include this contrast of the carefree and safe river and the dangerous and mischevious land. Huck and Jim encounter two con men, the King and the Duke, on land. The King and Duke put on a dramatic show for the town making them believe that they are the Wilks' brothers and are from England. Huck only knows the truth behind con men's tricks, and thus another troublesome event on land emerges. The Mississippi River actually protects him from all danger throughout the novel....

Sunday, January 12, 2020

Analyzing and Interpreting Data Essay

As a consultant, Team A has analyzed and interpreted the second set of data. The intent is to increase senior management’s understanding of the sources of employee dissatisfaction and too create a model that predicts employee resignation. The process will be to combine the week two learning team assignment and week three findings with week five findings and make recommendations to BIMS by using the statistical tables given in the appendices of the textbook and a statistical analysis application. Combined Weeks and Recommendations to BIMS The valuable information the first survey has given the employees is if employees would like to stay if he or she was offered some type of bonus for their work and their loyalty to the company. Each employee would be offered extra vacation days each quarter if their performance was high and he or she had no absences. However, questions and concerns were still unanswered completely with the data received. The management team felt that there should be another survey sent out. This next survey would address issues that were not covered in the first one and ask more detailed questions to the employees that are still working for the company as well as past employees. Some outside help to make sure the questions were unbiased was used. It was highly recommended to make sure that any employee who took the survey knew that his or hers answers and opinions would be kept is strict confidentiality. The survey was first tested on upper management to see what he or she thought about the questions on the survey. The survey was then changed to meet the concerns that still were addressed. Another survey was then presented to the upper management for final approval. Employees that were on leave from the company were also asked to take the survey. After the surveys were completed and the data was inputted the company had a better understanding on what were some of the major areas of concern. Communication was on the top of the list. A recommendation that the company can start with is communicating better with his or her employees. Some ways to do this is through more memos, emails, and meetings with department supervisors. The supervisors then can pass on information to their individual workers. This way everyone should know what is going on with the company. The employees have to feel wanted and needed. This can be done through more social events such as company barbeques, Christmas parties, and other outside get-togethers. Having a suggestion box can also do it. Employees can share his or hers opinions or concerns anonymously or he or she can make a suggestion for a change. If he or she’s changes are made within the organization he or she will receive a bonus. Sources of Employee Dissatisfaction From the analysis of the overall data that has been collected throughout the entire process, it has been concluded that the employees and management need to work on a better system of communication and cooperation. The main interpretation of the data is the dissatisfaction of the employees both former and current. This has become epidemic. The deterioration of communication has allowed the production of the company to fall. The intent of the survey and the face-to-face interview was to take a sample of the percentage of the employees not satisfied by the way that the senior management was conducting operations in which the relations of the employees were involved. The employees, as shown from the research, were feeling as though they were not appreciated and that the atmosphere that was gained from the management created a hostile work environment. The senior management wanted the surveys as a way for the employees to be able to make statements without having to place a name to the survey. Employees felt as if they are completely ignored and all suggestions that they had made that could improve relations have gone unheard. They feel as if though the management sees them as nothing more than a number that can easily be replaced without a thought otherwise. Therefore, this leaves the employees morale completely shattered and as that happens, so does the amount of productivity. When the employees feel as if they themselves, as stated by the survey and face-to-face interviews, will not work as hard and as an overall will hurt the company as a whole and they would like the senior management to take into account their disgrievences and communicate better with them. Model for Predicting Employee Resignation BIMS has developed a model for predicting employee resignation and turnover. After reviewing the surveys as well as the exit interviews; BIMS has developed a model based on logistics regression and then analyzing the turnover. They have developed five hypotheses from previous research of the effects of different factors affecting resignations and turnovers. The first hypothesis is based on the length that an employee has been with BIMS and that the more time invested in the company, the less likely they will resign. The belief is that increased tenure strengthens the propensity for employees to remain. The second hypothesis is that higher performing employees are less likely to resign than average to lower performing employees. One way to ensure higher performance is to implement a contingent reward system. In the event of continued low performance from certain employees, BIMS must be aware of the withdraw process: a major reduction in performance, possibly to unacceptable levels, and ending with resignation. The third hypothesis has to do with the age of the employee. The older the employees, the less likely they will resign as opposed to the younger employees and their length of employment. The fourth hypothesis is that more educated employees are less likely to resign than less educated employees. The more educated the employee, the greater the possibility for promotions and wage increases. The fifth hypothesis is that higher paid employees are less likely to resign than lower paid employees. The higher paid employees possess specific skills, which are more valuable to their current employer. In conclusion, if employees are offered incentives they will follow guidelines and achieve ethical practices. With better communication between management and staff it will create teamwork. Staff and management will work together more efficient and their follow through will be more appreciated. Giving the upper management a try at the surveys put them in the employee’s perspective letting them understand how employees feel. The surveys helped management come to the understanding of how to gain the respect back from their employee’s. Reference: McClave, J. T., Benson, P. G., & Sincich, T. (2011). Statistics for business and economics (11th ed.). Boston, MA: Pearson-Prentice Hall.

Saturday, January 4, 2020

Law of Constant Composition in Chemistry

In chemistry, the law of constant composition (also known as the law of definite proportions) states that samples of a pure compound always contain the same elements in the same mass proportion. This law, together with the law of multiple proportions, is the basis for stoichiometry in chemistry. In other words, no matter how a compound is obtained or prepared, it will always contain the same elements in the same mass proportion. For example, carbon dioxide (CO2) always contains carbon and oxygen in a 3:8 mass ratio. Water (H2O) always consists of hydrogen and oxygen in a 1:9 mass ratio. Law of Constant Composition History Discovery of this law is credited to the French chemist Joseph Proust, who through a series of experiments conducted from 1798 to 1804 concluded that chemical compounds consisted of a specific composition. Considering John Daltons atomic theory was only just beginning to explain that each element consisted of one type of atom and at the time, most scientists still believed elements could combine in any proportion, Prousts deductions were exceptional. Law of Constant Composition Example When you work with chemistry problems using this law, your goal is to look for the closest mass ratio between the elements. Its okay if the percentage is a few hundredths off. If youre using experimental data, the variation might be even greater. For example, lets say that using the law of constant composition, you want to demonstrate that two samples of cupric oxide abide by the law. Your first sample was 1.375 g cupric oxide, which was heated with hydrogen to yield 1.098 g of copper. For the second sample, 1.179 g of copper was dissolved in nitric acid to produce copper nitrate, which was subsequently burned to produce 1.476 g of cupric oxide. To work the problem, youd need to find the mass percent of each element in each sample. It doesnt matter whether you choose to find the percentage of copper or the percentage of oxygen. Youd simply subtract one of the values from 100 to get the percent of the other element. Write down what you know: In the first sample: copper oxide 1.375 gcopper 1.098 goxygen 1.375 - 1.098 0.277 g percent oxygen in CuO (0.277)(100%)/1.375 20.15% For the second sample: copper 1.179 gcopper oxide 1.476 goxygen 1.476 - 1.179 0.297 g percent oxygen in CuO (0.297)(100%)/1.476 20.12% The samples follow the law of constant composition, allowing for significant figures and experimental error. Exceptions to the Law of Constant Composition As it turns out, there are exceptions to this rule. There are some non-stoichiometric compounds that exhibit a variable composition from one sample to another. An example is wustite, a type of iron oxide that may contain 0.83 to 0.95 iron per each oxygen. Also, because there are different isotopes of atoms, even a normal stoichiometric compound may display variations in mass composition, depending which isotope of the atoms is present. Typically, this difference is relatively small, yet it does exist and can be important. The mass proportion of heavy water as compared with regular water is an example.