Featured Post

Cancer management Free Essays

Presentation The point of this case report is to give a wellspring of data in regards to patients with Bulky stage 1B cervical malignant ...

Tuesday, December 31, 2019

President Obamas First Executive Order

Barack Obama signed Executive Order 13489 on Jan. 21, 2009, one day after being sworn in as the 44th President of the United States. To hear the conspiracy theorists describe it, Obamas first executive order officially closed off his  personal records to the public, especially his  birth certificate. But what did this order actually aim to do? In fact, Obamas first executive order had exactly the opposite goal. It aimed to shed more light on presidential records, including his own, after eight years of secrecy imposed by former President George W. Bush. What the Order Said Executive orders are official documents, numbered consecutively, through which the President of the United States manages the operations of the federal government. Presidential executive orders are much like the written orders or instructions issued by the president or CEO of a private-sector company to that company’s department heads. Starting with George Washington  in 1789, all presidents have issued executive orders.  President Franklin D. Roosevelt, still holds the record for executive orders, penning 3,522 of them during his 12 years in office. President Obamas first executive order merely rescinded an earlier executive order severely limiting public access to presidential records after they left office. That now-rescinded executive order, 13233, was signed by then-President George W. Bush on Nov. 1, 2001. It allowed former presidents and even family members to declare executive privilege and block public access to White House records for virtually any reason. Rescinding Bush-Era Secrecy Bushs measure was criticized heavily and challenged in court. The Society of American Archivists called Bushs executive order a complete abnegation of the original 1978 Presidential Records Act. The Presidential Records Act mandates the preservation of presidential records and makes them available to the public. Obama agreed with the criticism, saying, For a long time now, theres been too much secrecy in this city. This administration stands on the side not of those who seek to withhold information but with those who seek it to be known.The mere fact that you have the legal power to keep something secret does not mean you should always use it. Transparency and the rule of law will be the touchstones of this presidency. So Obamas first executive order didnt seek to shut down access to his own personal records, as conspiracy theorists claim. Its goal was exactly the opposite—to  open up White House records to the public. Authority for Executive Orders Capable of at least changing how the laws enacted by Congress are applied, presidential executive orders can be controversial. Where does the president get the power to issue them? The U.S. Constitution does not explicitly provide for executive orders. However, Article II, Section 1, Clause 1 of the Constitution relates the term â€Å"executive Power† to the president’s constitutionally-assigned duty to â€Å"take Care that the Laws be faithfully executed.† Thus, the power to issue executive orders can be interpreted by the courts as a necessary presidential power. The U.S. Supreme Court has held that all executive orders must be supported either by a specific clause of the Constitution or by an act of Congress. The Supreme Court has the authority to block executive orders that it determines to exceed the Constitutional limits of presidential power or involve issues that should be handled through legislation.   As with all other official actions of the legislative or executive branches, executive orders are subject to the process of judicial review by the Supreme Court and can be overturned if found to be unconstitutional in nature or function.   Updated by Robert Longley

Monday, December 23, 2019

Essay about Macbeths Queen - 3071 Words

Macbeths Queen There are two main characters in William Shakespeares Macbeth, one of which is Lady Macbeth. Let us in this paper study her character in detail. Blanche Coles states in Shakespeares Four Giants evaluates the character of Lady Macbeth: A woman who could speak as Lady Macbeth does, who could call upon the spirits that tend on mortal thoughts to unsex her and fell her from head to foot full of direct cruelty, who could entreat these same spirits to stop all avenues of remorse so that no compunctions of conscience will interfere with the carrying out of her purpose, who could call upon the night to wrap itself in the murkiest, gloomiest smoke of hell in order to hide, even from the keen knife†¦show more content†¦The passions are directed to their true end. Lady Macbeth is merely detested; and though the courage of Macbeth preserves some esteem, yet every reader rejoices at his fall. (133) L.C. Knights in the essay Macbeth describes the unnaturalness of Lady Macbeths words and actions: Thus the sense of the unnaturalness of evil is evoked not only be repeated explicit references (natures mischief, nature seems dead, Tis unnatural, even like the deed thats done, and so on) but by the expression of unnatural sentiments and an unnatural violence of tone in such things as Lady Macbeths invocation of the spirits who will unsex her, and her affirmation that she would murder the babe at her breast if she had sworn to do it. (95) In Macbeth as the Imitation of an Action Francis Fergusson specifies the fears within Lady Macbeth: I do not need to remind you of the great scenes preceding the murder, in which Macbeth and his Lady pull themselves together for their desperate effort. If you think over these scenes, you will notice that the Macbeths understand the action which begins here as a competition and a stunt, against reason and againstShow MoreRelatedWilliam Shakespeares Macbeth Essay757 Words   |  4 PagesShakespeares Macbeth Macbeth was a â€Å"butcher†, however he became that way as a result of Lady Macbeth. Lady Macbeth was a fiend-like queen whose evilness declined after the murders. In the end of the play, however, Macbeth’s transformation was complete and he was a butcher. Main Body Topic 1 ================= Macbeth’s transition from good to evil by Lady Macbeth:  · Ambition was his only reason for killing the king – â€Å"I have no spur To prick the sidesRead MoreMacbeth And Lady Macbeth By William Shakespeare1343 Words   |  6 Pagesthe two main characters, Macbeth and Lady Macbeth. This husband and wife duo begins the play as polar opposites. Lady Macbeth’s maliciousness and drive is clear to the audience the first time she steps on stage in Act One Scene Five. She continues on with these same characteristics, yet in the middle of the drama, there is a distinct change in her attitude and overall role as Macbeth’s wife. This switch in Lady Macbeth becomes more evident as the audience grows more aware of the large difference inRead MoreThe Butcher and His Fiend Like Queen in William Shakespeares Macbeth765 Words   |  4 PagesThe Butcher and his Fiend like Queen in William Shakespeare’s Macbeth Introduction At the end of William Shakespeare’s Macbeth, Malcolm refers to Macbeth and Lady Macbeth as: This dead like butcher and his fiend like queen, when he was crowned as new king of Scotland. In Malcolm’s eyes, the Macbeths are just that, cruel murderers who stole away the throne from him and his father. A butcher can be described as someone who kills, or have people killed unnecessarily or brutally. A fiend canRead MoreEssay on Macbeth: Lady Macbeth and Evil914 Words   |  4 Pagesmake her male. One of the most vivid descriptions of Lady Macbeths wickedness is directly after Macbeth announces to her he does not want to kill Duncan.This speech epitomizes Lady Macbeths evilness. She is ruthless, and her evil accounts for the murders that occur throughout the play Macbeth. Lady Macbeth is far more savage and ambitious than her husband, yet she convinces Macbeth to commit the murders that will make them king and queen. Macbeth is without his wifes cruel and uncompassionateRead MoreLady Macbeth And Lady Macbeth : How Crime Murders Relationships1544 Words   |  7 PagesHow Crime Murders Relationships Shakespeare’s Macbeth follows the journey and downfall of the titular protagonist, and it illustrates the effects of Macbeth’s descent into villainy on his once loving and close relationship with Lady Macbeth. As their initially mutually trusting and co-dependent relationship deteriorates through the progression of the three great crimes, Shakespeare demonstrates how murder can permanently destroy a person and their relationships. Leading up to the murder of DuncanRead MoreThe Tragedy Of Macbeth By William Shakespeare972 Words   |  4 Pagesprominent theme in the whole play is that of the â€Å"unsexing† of Lacy Macbeth’s character. Lady Macbeth wants to act in such a way that is not connected to her gender; we see this and how it relates to the plot and her part in both the rising action and climax in the book. Lady Macbeth tries very hard to unsex herself and yet in the end, she becomes the epitome of what women were seen as, weak and at fault. Shakes peare writes Lady Macbeth’s character so that she is to blame for many things that happen andRead MoreEssay on Macbeth Issues867 Words   |  4 PagesMacbeth, there are many issues that may have had an affect on the play. The complex marriage between the power hungry Macbeths, lady Macbeth’s dominant character directing Macbeth in the murders, the role reversal during the murders, Macbeth’s reaction to his wife’s death, and male and female marriages for authority. When analyzed these issues help describe the Macbeth’s relationship. They are the very issues that eventually lead to the â€Å"Great Tragedy†. The relationship of Macbeth and Lady Macbeth isRead MoreFeminism in Macbeth1712 Words   |  7 Pagesof Lady Macbeth, marriage is Macbeth’s big mistake. Lady Macbeth turns his courageous conquests on the fields of war into butchery. Mangled by the blood-spotted hands of his wife he becomes a traitor to himself, the people around him, and even her. In the beginning they both desire power and Lady Macbeths starts to put evil thoughts in her husband’s head. Eventually Macbeth turns into a guiltless monster, which ironically causes Lady Macbeth’s downfall. Lady Macbeth’s life centers completely on herRead MoreCharacter Analysis Of Lady Macbeth1100 Words   |  5 PagesHowever, this is not an accurate statement. Lady Macbeth does begin as an ambitious and callous fiend. Throughout the story, Lady Macbeth’s character changes dramatically into a shell of her former self. Lady Macbeth character evolves from an ambitious villain, to a neutral entity, and finally to a remorseful, unstable person. In the beginning of the play, Lady Macbeth’s character is established as strong, cruel, and ambitious. When the letter from her husband comes, she is already making a planRead MoreEssay On Greed In The Great Gatsby1101 Words   |  5 PagesWilson demonstrates the deadly sin of greed through her affair and aspiration to acquire luxuries from Tom. In comparison, Lady Macbeth illustrates the deadly sin of greed through her strong desire to become Queen of Scotland. In the play Macbeth, Lady Macbeth learns of Macbeths prophecy through a letter that claims he will become King. Lady Macbeth states, Lady Macbeth: Hie thee hither, that I may pour my spirits in thine ear; and chastise with the valor of my tongue, all that impedes thee

Sunday, December 15, 2019

Sentencing Paper Free Essays

Sentencing Paper Deadrian Williams CJS/ 200 3/3/2013 Bryan Maglicco Six Forms of Punishment Fines are one of the oldest forms of punishment, the use of fines as criminal sanctions suffers from built in inequities and a widespread failure to collect them (Schmalleger, 2011). Fines can deprive offenders of the proceeds of criminal activity, and also promote rehabilitation by enforcing economic responsibility (Schmalleger, 2011). People have to pay fines when they break minor laws, such as driving while intoxicated, reckless driving, disturbing the peace, public drunkenness, and vandalism (Schmalleger, 2011). We will write a custom essay sample on Sentencing Paper or any similar topic only for you Order Now Capital punishment is the death penalty. Capital punishment is the most extreme of all sentencing options (Schmalleger, 2011). Capital punishment is sentenced when someone comments a capital offense. In 2008, for example, a twenty eight year old man was sentenced to death in the atrocious murder of a ten year old girl in what authorities said was an elaborate plan to cannibalize the girls flesh (Schmalleger, 2011). Today, the federal government and 35 of the 50 states permit execution for first degree murder, kidnapping, aggravated rape, the murder of a police or corrections officer, or murder while under a life sentence (Schmalleger, 2011). Probation is another form of punishment. Probation means testing the behavior or abilities. In a legal sense, an offender on probation is ordered to follow certain conditions set forth by the court, often under the supervision of a probation officer (Wikipedia, 2013). Offenders are ordinarily required to refrain from firearms, and may be ordered to remain employed, have a curfew, live in a decent place and not leave the jurisdiction (Wikipedia, 2013). Incarceration is another form of punishment. Jails are shorter lock up centers ran by counties and operated by sheriffs (Cliffnotes. com Types of Sentences, 2013). Usually inmates that are in jail are waiting to go to trial who were unable to make bail, people with misdemeanors, and felons who violated probation (Cliffnotes. com Types of Sentences, 2013). Also people re incarcerated in prisons who are convicted felons. Prisons are operated by the state (Cliffnotes. com Types of Sentences, 2013). Community service is another form of punishment. Community service is paying your debt back to society for the wrong doings that a person does, by doing work that benefits the community (Cliffnotes. com Types of Sentences, 2013). People doing community service clean up highways, cut grass, plant trees and flo wers, and wash away graffiti. People who are punished with community service have a certain amount of hours they must do to complete the community service order. Failure to complete community service can lead to possibly jail time and more fines. Reducing recidivism Recommendations on how to modify the sentencing process would be to look at the record of the defendant and also the severity of the crime when sentencing. If someone has committed a murder or a rape, or kidnapping then they should get the severest sentence possible even if it is their first time because those crimes are against people. Families have been destroyed because of what the person did. Good behavior should not play in the sentencing of these offenders. They did not think about the victims when they committed the crime so the courts should not give them a break because of good behavior. If the sentencing process was stricter and focused more on the offender punishment and not what other people would say and feel about the crime then it would be a lot less crimes. References Cliffnotes. com Types of Sentences. (2013, March 4). Retrieved from Cliffnotes. com: http://m. cliffnotes. com Schmalleger, F. (2011). Criminal Justice Today. Prentice Hall. Wikipedia, (2013). How to cite Sentencing Paper, Essay examples

Saturday, December 7, 2019

E-Technologies have Changed Modern Social Life and Remedies

Question: How E-Technologies have Changed Modern Social Life and Remedies. Answer: The advent of electronic technology, also known as e-technology, has significantly changed how human beings interact with each other and how they stay connected. However, with the proliferation of these technologies, one would imagine these tools would help people to have a better understanding of other cultures, communicate effectively with other people, maintain and enhance familial relationships, and help most people to be more socially adept. However, that has not been the case. These communication devices have caused many people to get distracted, be increasingly stressed, and be overly isolated. Impact on Social Life The use of e-technology has several positive and negative consequences. Some people have been able to find long-lost friends through e-technology platforms, especially social networking sites, and this has enabled them to reconnect and live happy lives again. In communities where people are highly mobile, and friends and family members work or live in different geographical areas, they find it quite convenient to use e-technology so as to keep in touch. Since it requires only a few seconds to pass across a message and subsequently receive feedback, it removes the barrier of distance (Rocha 2013; Atkinson and Castro 2004). In addition, these tools make everyone equal. As a result, it is easy to communicate with people from a wide variety of backgrounds using these devices. When people are interacting over the Internet, for example, it is difficult for them to know whether they are more senior than the other party. With a professionally developed website, a junior person can appear well informed on the Internet as other experts as there is no way they can be judged based on their age, skin color, race, and more other similar factors (Hertlein and Blumer 2014). However, there are also problems that are associated with this technology. Most people on social media consider perception to be the reality. Many people agree that many users on their social media networks are not their real friends. However, social networking sites have added a new meaning to friend. They consider two people to be friends or not friends, which make people to consider perception to be reality (Turkle 2012; Roberts 2010). Studies indicate that these sites create a platform for promiscuous trust relationships that eventually contribute to cheating on significant others, which have lead to many cases of divorce. The number of people who have been fired from their jobs and given warnings for using these tools or posting something that undermines their professional standings is also on the increase. These problems arise because users consider each other as friends online (Turkle 2012; Woolgar 2002). While the loss of jobs and divorce are serious issues, other problems that the potential to stem from social media such as narcissism are more common than them. Most websites encourage narcissism, a condition in which someone exhibits extreme interest in another persons appearance and oneself. This behavior leads to lust, cybersex addiction, and other obscene reactions. Some experts consider that most people also use social networking sites to display their popularity to their audience instead of using them as a vehicle to develop real, meaningful relationships (Woolgar 2002). Creating meaningful relations is about people sharing their lives with their friends and acquaintances. It is possible to use technology to do that through photos, music, text, and videos. A recent survey has indicated that those who have to know each other for years more easily connect through e-technology than those who have never met (Thomson 2006). However, online communities and virtual worlds cannot offer an opportunity to many people to overcome a sense of isolation. Individuals who successfully find others online with similar hobbies and interests may feel good but does not necessarily have a positive effect on their social skills and social development. The greatest problem comes when people find themselves subtly substituting electronic relationships for physical relationships. Too much electronic relationships also engender a sense of social isolation (Lickerman 2010). There is also the risk of Identity hijacking, which allows people to pick the personal information of an individual and use it to create another profile. Since many people trust what their friends post on social media, malicious users can use this strategy to execute their plans on others with almost no detection (Adam and Smith 2008; McCloud 2013). E-technology is a risk factor for Internet gaming addiction. Internet gaming is an instance where people can encounter serious social setbacks. Most young people who are addicted to these games find it easy talk about romantic relationships of some virtual world games, but when they are granted an opportunity for deep, respectful, and meaningful conversations, they are inept. While linking their poor social skills to these games might appear a little far-fetched, research has pointed out several negative social impacts of some videos on young people. One recent study indicates that playing violent video games is a leading risk factor for later physical aggression for both boys and girls (McQuade et al. 2012). The same research, however, also implies that linking gaming to poor social skills can miss the big picture. There are instances where people can take part in real activities such as football, and when the social problems that arise from these activities are the same or worse than those of gaming, gaming can help in relationship building (McQuade et al. 2012). Electronic television also has both positive and negative impact on social development. Studies indicate that families that take a limited amount of time watching wholesome programs have healthier relationships than those that do not. Other researchers, however, think that television is contributing significantly to the rotting of social values, which in turn makes it difficult to build useful relationships. Since many people spend more time watching television than with others on their communities and television is a passive medium, it provides almost no opportunity for meaningful interaction while watching. This element of passiveness can have a negative impact on the social skills of people. Television denies viewers the opportunity to learn how to relate to and deal with others (Willard 2007). Exposure to Internet games can cause some serious negative effects on peoples social lives. Exposure to shows that present sexual content can increase teen pregnancies. In addition, some people who see violent behavior accepted in a virtual community are often prone to mimic. If everyone were to mimic the immoral behaviors that are presented in many shows, the society would lack morals and many peoples lives would be destroyed Willard 2007). Phishing, an act of stealing sensitive information through a medium that presents itself a legitimate authority, is another common problem. For a phishing scheme to succeed, there must be an appearance of legitimacy and also trustworthiness of the delivery medium. Modern schemes depend on detailed personal information for targeted attacks. When one is so readily willing to disclose has phone numbers, interest, education history, and addresses, they find the work easy. Although there are no reported damages caused by phishing using these sites, it poses a real danger. Since over 15,000 people sign up on Facebook daily, the attacks and their severity are set to increase (Carlson 2008). E-technology is also a threat to physical security. When people frequently update on Twitter about where they will be at a particular time, it helps malicious people to figure out where one is. It creates opportunities for kidnapping, assault, and burglary (Willard 2007). Overcoming the Threats and Risks While studies have not successfully established a common ground about all the harmful and beneficial effects of e-technologies, these technologies remain to be the main tools that families will continue to use to make life choices and opportunities. In the modern world, people have no option other than to use electronic technologies to interact with public institutions as paper applications and many other communications are no longer accepted. Technology is becoming the only efficient means through which people can apply for jobs, share neighborhood news, do schoolwork, gather together, and share the news about family celebrations and problems. Because of this, supplies of e-technologies are looking for ways to overcome the risks and threats associated with these tools so as to ensure people make the best use of these technologies without the fear of encountering any negative consequences (Ioannides 2006). Suppliers of electronic technologies are seeking to overcome these threats and risks. These sites provide a high level of access control. Facebook, for example, encourages users to configure its privacy settings to have control on who can access some or all of their personal information. In addition, these sites require people to use their real names. The information they contain is either mostly real or easily identified as fake. Most people have almost no reason to falsify information on Facebook for the purpose of keeping up with their friends in a trustworthy manner. Myspace and LinkedIn users also strive to use their real names. According to research, only eight percent of Facebook users have fake names, and 89 percent use real names. The rest uses partial names (Ioannides 2006; Cross 2013). One can also use browsing scope settings to limit the ability of people to view information across spans in any group. A user can decide that his detailed personal information can be viewed up to a specific number of degrees away. LinkedIn requires authorization for any user that is not a direct connection, which is a good control in this category. While this one may not prevent some users from hijacking a profile and gaining access to it, it effectively helps to prevent widespread automated information harvesting (Cross 2013; Lewis 2014). Combined with the low level of education and shoddy privacy settings, these sites provide the perfect ground for collecting information and breading attacks. Supplies of e-technologies recommend that at the application level, one can avoid identity hijacking, phishing, and information theft by enforcing Microsoft Internet Explorer or Mozillas phishing control. Services like PhishTank and BlueCoat also provide network and application blacklisting that one can use as an added protection (Lewis 2014). The first remedy for identify hijacking is verification of emails. Users should check for valid addresses. In addition, they check for valid addresses in profiles they interact with. Another solution is having strong passwords and avoiding the sharing of passwords across many sites. VeriSigns Personal Identity (PPI) and OpenID can solve this issue. The work of OpenID is to provide a central location for high-grade security login credentials. PPI, on the other hand, performs two-factor authentication. These social media sites also encourage users to take precaution when dealing with people virtually, even they that claim to be friendly or that we know them. When verifying any sensitive information, people should take special care (Mathews 2013). Physical attack is a problem that can be solved by toning down details posted on sites like Twitter and Facebook about an individuals whereabouts. Ones status updates should not contain specific details and need to be posted only after that fact (Rockelmann 2013). Conclusion According to this analysis, e-technology has the potential to either improve or harm peoples social lives. Malicious users can leverage these tools as an attack vector. Ranging from information theft and identity hijacking to plastic relationships and Internet addiction, e-technology poses a real yet quite exclusive form of social security threat. On social media networks, one can access a massive amount of personal information, and the lack of effective and easy to use security devices makes these sprawling applications an ideal sandbox for malicious people. There are several countermeasures. However, the best one is user education. E-technology users need to know the consequences of posting detailed personal information and treating strangers as friends. Whether users get a friend request or potential phishing messages, they ought to appreciate that the proper ways of safeguarding themselves and their friends and relatives from attack. Another major method is suppliers of these technologies enhancing security measures. They understand the risks involved, and it is appropriate to follow their advice and also use the security features on the applications appropriately so as to be able to get the most benefit from technology. Technology has changed over the years, and at each stage, it has made life much easier and accessible. However, suppliers of e-technology need to continue advancing these popular and ever changing applications to safeguard the interests of everyone. Bibliography Adams, Tyrone, and Stephen A. Smith. Electronic tribes: the virtual worlds of geeks, gamers, shamans, and scammers. Austin: University of Texas Press, 2008. Atkinson, Robert D., and Daniel Castro. "Digital Quality of Life: Understanding the Personal and Social Benefits of the Information Technology Revolution." SSRN Electronic Journal, March 09, 2004. doi:10.2139/ssrn.1278185. Carlson, Linda. Internet safety and your family: how to protect kids and adults from electronic bullying, cyber crime, identity theft, addictions. Place of publication not identified: Parenting Press, 2008. Cross, Michael. Social media security leveraging social networking while mitigating risk. Amsterdam, Netherlands: Syngress, 2013. Hertlein, Katherine M., and Markie L. C. Blumer. The couple and family technology framework: intimate relationships in a digital age. New York: Routledge, 2014. Ioannides, Marinos. The e-volution of information communication technology in cultural heritage. where hi-tech touches the past: risks and challenges for the 21st century: 30. October - 4. November 2006, Nicosia, Cyprus. Budapest: Archaeolingua, 2006. Lewis, E. E. How safe is safe enough?: technological risks, real and perceived. New York, NY: Carrel Books, 2014. Lickerman, Alex. "The Effect Of Technology On Relationships." Psychology Today. June 08, 2010. Accessed April 06, 2017. https://www.psychologytoday.com/blog/happiness-in-world/201006/the-effect-technology-relationships. Matthews, Carole Boggs. Facebook for seniors: quicksteps. New York: McGraw-Hill, 2013. McCloud, Ace. Gaming addiction, online addiction, internet addiction: how to overcome video game, internet, and online addiction. United States: Ace McCloud, 2013. McQuade, Samuel C., Sarah Gentry, James P. Colt, and Marcus K. Rogers. Internet addiction and online gaming. New York: Chelsea House, 2012. Roberts, Kevin J. Cyber junkie: escape the gaming and internet trap. Center City, MN: Hazelden, 2010. Rocha, A?lvaro. Advances in Information Systems and Technologies. Heidelberg: Springer, 2013. Rockelmann, Richard W. Facebook policy and user knowledge: self-inflicted totalitarianism. 2013. Thomson, Bob. Growing people: learning and developing from day to day experience. Oxford: Chandos, 2006. Turkle, Sherry. Alone together: why we expect more from technology and less from each other. New York: Basic Books, 2012. Willard, Nancy E. Cyber-safe kids, cyber-savvy teens: helping young people learn to use the Internet safely and responsibly. San Francisco: Jossey-Bass, 2007. Woolgar, Steve. Virtual society?: technology, cyberbole, reality. Oxford: Oxford University Press, 2002.