Wednesday, July 31, 2019

The Korean War: Tactics and Logistics

The Second World War officially ended in the year 1945. It was a devastating war that many hoped that it should be fitting to end all wars and for a change give the world a breathing space, to be granted that very elusive peace. Yet, perhaps those who wished for a world in harmony after World War II may have underestimated mankind’s appetite of some leaders who wanted to be supreme rulers of the globe. So, five years after the guns were silenced in the Great Theater of war in Europe, another dangerous conflict is brewing in Korea. Here, one can see a display of things to come because Vietnam and Afghanistan are still future events.  In the Korean War the world became witness to what happens when superpowers decide to play chess. Unfortunately, this game is not played the traditional way with wooden pieces and all. This time the chessboard is the Korean Peninsula and the pieces are either the native Koreans or imported as in soldiers coming in from all over the world. It is interesting to note that this is not a World War in the truest sense of the term, but the true players are global leaders who happened to confine their violent resolution in a specific location, Korea. The United States, Russia, North and South Korea, United Kingdom, Canada, Australia and other Asian nations were participants in this war of attrition. The battle lines were drawn and it was named the 38th parallel. This allowed for a little bearing in a very confusing time, hoping to give a little bit of clarity in a very agitating situation. According to Carter Malkasian, â€Å"It was the only occasion in the Cold War when the military forces of the People’s Republic of China (PRC), the Soviet Union, and the USA (plus its Western allies) met in combat [†¦] Thus, the Korean War was not merely a war fought between proxies of the major powers, like the latter conflicts in Vietnam or Afghanistan, but a much more significant conflagration† (p. 7). This paper seeks to understand the Korean War. This can be done by looking at a brief historical background before the war and the events that added fuel to the tension between two Korean governments. Since the Korean War like many conflicts is so complicated this study focuses on tactics and logistics, and less on the historical figures that played a major role in this important period not only for Koreans but for Asians in particular and the world in general. Historical Background The Korean War was sometimes called the â€Å"Forgotten War† and this may be so because like Vietnam there are only a few people who understand its significance. Yet an â€Å"†¦outpouring of books, articles and film in the last decade as well as an impressive memorial on Washington, DC’s Mal (and the realization that) †¦it would be practically impossible to understand the Cold War†¦Ã¢â‚¬  have created a revival of interest on this subject (Sandler, p. 1).  The conflict in this area of the world does not surprise the experts and the grizzled veterans of war. In fact the professional soldier can easily read the undercurrent of history and be able to predict what will happen in the struggle for power and supremacy. This was eerily demonstrated by a seemingly prophetic Commodore Matthew Perry when he spoke these words in the year 1856, a century before the Korean War: The people of America will, in some form or other, extend their dominion and their power [†¦] upon the eastern shores of Asia. And I think too, that eastward and southward will her great Russian rival [†¦] The antagonistic exponents of freedom and absolutism must thus meet at last, and then will be fought that mighty battle on which the world will look with breathless interest; for on its issue will depend the freedom or the slavery of the world (as cited in Huston, p. 200). It boggles the mind of the average person when analyzing as to how Commodore Perry was able to ascertain his claims. What is more amazing is the accuracy of his predictions. It is like looking in a crystal ball and seeing very clearly what will happen. And indeed what Perry prophesied came to pass. Russia became a superpower and just like what the Commodore had said, the Russian government exerted tremendous influence over China. And of course his final statement about the necessity of a crucial war that will showcase the fight for freedom as opposed to absolutism was also played out just as he predicted. This can only mean that even before the first bullet crossed the 38th parallel, there are already forces at work even as far back as the late 19th century. Perry was able to read the signs and the saw the root cause of conflicts in this part of Asia. Yet it was only in the 1950s when the seed planted by those who wanted to control this region grew and blossomed into a passion that could only be satisfied with conquest. Blindsided Commodore Perry was praised here because of his foresight, a very important talent that a general should possess. If only the leaders of the free world in the 1950s were as gifted, then things would have turned out differently. But as fate would have it, from the U.S. and UN side was able anticipate what is going to happen. Either they were blindsided by the Communists or they were preoccupied by their paranoia. And that paranoia is brought about by the fear of being overrun by a westward move by the Union Soviet Socialist Republic. Stanley Sandler remarked on this and he wrote: A Soviet thrust into Western Europe seemed a far more threatening contingency than a possible dust-up between two unattractive regimes in a bleak former Japanese colony that most Americans could not find on a map. But Americans [†¦] would become acquainted with Korea in a war that would turn out be the third bloodiest in their history [†¦] and which for Koreans themselves would prove the greatest catastrophe in their national history (p. 2). First Blood It depends which side is asked. For the U.S. and UN Command, it was the North Koreans who drew first blood and attacked without warning nor any form of declaration of war. It seems that history is repeating itself once again for Americans just like in Pearl Harbor. But according to the communist-backed regime they were just retaliating from what the South has been doing for the past several months. The truth of the matter is that both sides were engaged in skirmishes that were serious prelude to war. Sandler asserts that it was an, â€Å"†¦armed conflict between the Democratic People’s Republic of North Korea and the Republic of South Korea, which had been conducting mutual border raids for more than a year† (p. 2).  At any rate the U.S. led forces were caught by surprise that fateful day of June 25, 1950. Even if they will deny it, it is now clear that the North were prepared to launch an attack and the offensive move was purely intentional. Buildup Kim Il Sung the de facto leader of the newly established North Korean Regime began to make plans to invade South Korea. This plan was of course made in secret but nevertheless in close coordination with Russia’s Stalin and China’s Mao Tse-tung. According to Allan Millett the origin of this plan can be traced back to a change in the policy of Kim Il Sung’s benefactor to communize the whole Korean Peninsula (p. 102). It seems that Russia is no longer contented with being kept in check by a ridiculous 38th parallel and would like very much to gobble the whole Korean Peninsula. â€Å"The Soviets, however, came to realize that the goal of communizing the entire peninsula could not be achieved through such limited tactics, and decided to resort to more violent means† (Millet, p. 102). In December of 1948 the Soviets made the first tactical move to befuddle the U.S. by withdrawing their troops unilaterally out of North Korea. Then the Russian government turned around and invited the top brass of North Korea and China’s military for a buildup. Millet bared that the troika agreed to â€Å"†¦build up the strength of the North Korea People’s Army (NKPA), around 6 shock divisions, 8 combat and 8 reserve divisions, and 2 armored divisions and to complete the war preparations within 18 months (i.e., by June 1950)† (p. 103). The NKPA was able to do all of these like clockwork revealing a tremendous level of preparedness and dangerous intent. Level of Preparedness While the NKPA was psychologically and physically prepared to engage in battle the ROK (Republic of Korea) army though prepared for future skirmishes and for another round of border raids was not truly ready for a full scale war. The South was not ready to face an enemy dead set in gobbling them up and desiring to unite the whole peninsula once again. It took at least five days after the initial offensive of NKPA for the U.S. to make a coherent response. â€Å"On June 30, US President Harry S. Truman authorized US ground forces to stop the North Korean attack† (Boose, p. 4). This led to losses in the early rounds of the fighting and led Boose to comment, â€Å"It was able to do little to delay the KPA, but additional forces were on the way† (p. 4). Aside from differing interests and the reasonably defective intelligence from the Western nations – or they would have known of an imminent attack – there is the psychological reason for being unprepared. Sandler made a comment why it was unlikely for the Korean Peninsula to be plunged into such a bloody conflict. And he wrote: In looking back (before World War II) †¦ it would be difficult to imagine a more homogeneous and united nation than Korea. [†¦] they are of the same culture with minor north-south variations throughout the peninsula, and the Korean language – Hangul – is universal. Korean cultural homogeneity can be illustrated in its place name, a source of confusion for non-Korean UN personnel throughout the war: Inchon/Ichon, Masan/Musan, Paengnyong/Pyongyan/Pyonggang Pyongchang, Taejon/Taechon, Pukchong/Pukchang†¦(p. 3). That and the eighteen month head start is creating a great advantage for the NKPA. In the end this advantage would create a stalemate and would result in the present division of Korea and the unexpected survival of this communist state even though its patron the great USSR had long been dismantled. NKPA Preparedness The North Korean and the communist forces were not only decisive and aggressive they were able to create a force enough to challenge U.S. and UN supremacy in the South. The book, â€Å"Communist Logistics in the Korean War† by Charles Shrader is an excellent source in getting an in-depth look at what happened on the other side. Too many times the victors or the presumed victors in the case of the Korean War are all too willing to gloss over their mistakes and hype their successes. The focal point of this book is the refutation of the myths perpetuated by the Americans and UN forces that were then passed on to people back home and unfortunately was taken in as gospel truth. Shrader asserts and this is quite a revelation: One of the more persistent myths of the Korean War is that North Korean and Chinese communist solders were able to subsist on a mere handful of rice per day obtained all their arms and ammunition from their enemies, and moved all supplies by animal cart or human porters. Although supply requirements of NKPA and CCF in Korea were amazingly low when compared to the requirements for equivalent UNC units, the Communist forces did generate substantial requirements for formal supply and transport forward of tremendous quantities of food, petroleum products, weapons, and ammunition (p. 89). The U.S. and UN led coalition were more technically advanced but this is not the most important thing in any given war. It is the level of preparedness that is important. That level of preparedness can only be gauged in relation to the environment where a battle will be waged. Let’s say for example that forces are slugging it out in a heavy-forested area with a very steep incline. No matter how sophisticated the military jeeps are, this kind of technology will be rendered effective. In another example where the passageway in a body of water is narrow and shallow no matter how technologically advanced the frigates are it would be foolish to attack using this route since one sunken vessel can immobilize the whole fleet. In other words tactics and logistics are the most important aspects to consider and not just technology. This is the bone of contention in Shrader’s books – the South Korean forces was wrong in thinking that they were technically superior. This led Shrader to remark that:  NKPA-CCF logistical doctrines and methods were characterized by flexibility and innovation, which allowed them to compensate for comparative lack of material resources and modern technology [†¦] NKPA and CCF logistical organizations were equally flexible and often exhibited great variation in form, strength, and equipment of the assigned service units (p. 25). What contributed well to the high level of preparedness by the NKPA – aside from the Soviet support of course – is the broad range of natural resources present in North Korea. This includes water, power, timber, rare strategic materials e.g. tungsten, zinc, graphite reserves, substantial iron ore deposits, copper, lead, cobalt, asbestos, molybdenum, nickel, gold and silver (Shrader, p. 60). This resulted to an almost miraculous surge in North Korea’s war time production of needed materiel that surpassed pre-1945 levels: 1) 166,000 tons of pig iron; 2) 144,000 tons of steel ingot; and 3) 116,000 tons of finished steel (Shrader, p. 61). Summing it all up the major source of military materiel came via USSR which supplied the NKPA with aircraft, tanks, vehicles, communications equipment, heavy artillery, and ammunition. In addition to that, a portion of their needs were supplied by third country suppliers (Shrader, p. 60).  Thus when the communist forces launched the initial attack in June of 1950 their combined forces produced the following massive force in the eve of the attack:  Ã¢â‚¬ ¦135,000 men in two corps comprising eight full-strength infantry divisions, two half-strength infantry divisions, an armored brigade, an independent infantry regiment, a motorcycle reconnaissance regiment, and five brigades of the Bo An Dae, or Border Constabulary (Shrader, p. 90). What is more amazing is the development of the NKPA forces after the 1950s. After suffering setbacks from the retaliatory attacks of the UN command, the NKPA in the middle of 1951 the â€Å"rebuild NKPA included 213,600 men in twenty-three infantry divisions, one mechanized division, one armored division, and two independent infantry brigades controlled by seven corps headquarters. NKPA strength peaked in October 1952 at around 266,000 men in eighteen divisions and six independent brigades† (Shrader, p. 90). If this was not enough to give the South Koreans and its allies a full plate, the Chinese and the Soviets entered the fray in the guise of helping a beleaguered brother-in-arms. The forces supplied by the People’s Republic of China was more than enough to bring this regional level conflict into World War scale. The following data proves the serious intent of the communist bloc: By late November 1950 some 300,000 Chines Communist troops were in Korea: 180,000 in the six armies (eighteen divisions) of the XIIIth Army Group [†¦] 120,000 in the three armies (twelve divisions) of the IXth Army Group [†¦] on 1 July 1952, fify-one CCF divisions with some 540, 200 men manned the line across Korea from the west coast to the central Taebaek Range and were supported by about 10,000 Soviet and Soviet-bloc advisors and technicians (Shrader, p.90).  This is the extent of the level of North Korea’s preparedness and a sample of their resolve to win this war. ROK Preparedness Stanley Sandler in a few words was able to encapsulate the true state of South Korea’s forces before the attack by saying that June 25, 1950 was a Sunday and that fully one-half of the ROK Army was on leave (p. 48).  In the initial stage of the attack which was not at all done quietly and with any subtlety: heavy bombardment, followed by a blitzkrieg attack of some 150 Soviet-built T-34-85, 110 warplanes and a crossing of the 38th Parallel by a rampaging Korean People’s Army. Still there was an awfully delayed reaction to the events at hand. Sandler explained the reason for such a weak response due to the aforementioned soldiers who were on leave, the high number of civilian leaders who were out of the country and the mistaken notion that what just occurred was another border raid.  With regards to the presence of U.S. troops, Gordon Rottman lamented that fact that it was such in great shape a mere five years before the conflict and would have come handy in a time like this. But Rottman revealed that the U.S. government intentionally reduced its military strength not only in Korea but also in the Far East. Rottman comments on the closest source for help which are the forces stationed in Japan and he wrote: Tank companies stationed in Japan had only M24 light tanks as Japanese roads and bridges could not support heavier M4A3 and M26 tanks. M24s were no match for North Korean T-34s, one of the best tanks to appear in World War II. The divisions in Japan also lacked their reconnaissance, military police, and replacement companies [†¦] These divisions consisted of 12,500 to 13,600 troops rather than the full-strength 18,804 (p. 3). At first glance, South Korea does not stand a chance against the forces of Communism. Ironically, the same benefactor who gave NKPA a tactical and logistical advantage (USSR) became the source of their demise. Sensing that the North/South conflict is just a prelude for something bigger Russia’s enemies were banded together for a common cause, which is to prevent the USSR and Communism from expanding worldwide. This resulted in a pledge of commitment to provide support in a scale reminiscent of Word War II. When the NKPA was not able to achieve total victory, this gave the U.S. and UN led coalition to regroup and pose a decent defense of South Korea. Rottman expounded on this idea by saying that: The Korean War was to be the UN’s first commitment of armed forces to conduct and end a war [†¦] the UN called on all member nations to support the military effort in Korea. Fifty-three countries approved of armed action against North Korea: 15 committed ground combat forces, nine provided naval forces, six sent air force elements, and five contributed medical support, either military or civilian (p. 117). Bright Spot In general there is nothing that U.S. armed forces could be proud of in the Korean War. There was really no clear victor, no territory was gained and as mentioned earlier it was the third bloodiest in the history of war where casualties are at a significant high.  The only good thing that could be seen or learned from this incident is the demonstration of what bravery and commitment can do to an organization. Here one can also see the difference between a regular soldier in the U.S. Army as opposed to the brave and the few of the U.S. Marine Corp. Hugh Deane quoted Andrew Greer when describing the essence of being a marine, â€Å"In any small unit battle the outstanding behavior of a few men is always discernible over the others [†¦] The scale is tipped by a few – by the ten percent – who rise to the heights where the enemy and death can be met without a hesitant step† (p. 97). British historian Max Hastings remarked, â€Å"Most of the Eight Army fell apart as a fighting force in a fashion resembling the collapse of the French in 1940, the British in Singapore in 1942. But he reported the praiseworthy strong resistance of the U.S. Marines in the northeast† (as cited in Deane, p. 111). A particular example was raised by Deane when he commented on the enemy’s attack tactics that looked like suicide attempts characterized by sending small units that more often than not gets wiped out. This is followed by wave after wave of such small unit attacks against a selected point until a breakthrough is achieved and here comes the main force. This was effective in demoralizing troops. But according to Deane this would not work against the marines. â€Å"†¦but against the marines in the Northeast the results were often frustrating. The marines constructed strongly fortified outposts in the hilly-forested Chosin area and defended them fiercely with a good deal of success (p. 129). Conclusion Almost all wars are considered a waste of time, money, effort and lives of men. The Korean War was no exception. Considering the following statistics makes one shake hid head over the folly of war:  The North Korean armed forces lost approximately 600,000 men in the fighting, in addition to two million civilian casualties. The Chinese [†¦] an estimated 1 million casualties. Losses to the ROK are estimated at 70,000 killed, 150,000 wounded and 80,000 captured. One million South Korean civilians were killed or injured. The USA lost 33,600 men kiled nad 103,200 wounded (Malkasian, p. 88). What adds insult to injury is the futility of not having a clear victor, no territories were gained and nothing significant was achieved except perhaps for a few lessons in the book of tactics. The level of preparedness of both camps explained the reason for the stalemate. The South Korea side was backed up by a technologically superior U.S. and UN led coalition but it was not mentally prepared to wage this war. Almost every action done on the part of South Korea was mostly reactionary and defensive. Most importantly, the United States was treading on thin ice since a miscalculation and overkill can easily escalate the regional conflict into a global war. With the Second World War fresh from people’s minds there is no incentive to go full force. Although the NKPA was well prepared and very much flexible in their serious bid to unite the Korean Peninsula it does not have the technological edge to overpower the U.S. and UN forces. On a more important note, the attack on South Korea was a supposed to be a defensive act. Therefor the USSR could not be seen as fully involved and thus it can only work from the background.  That sums up the futility of this exercise but nevertheless it is a good prelude to understand the Cold War and the other similar conflicts that came after it like Vietnam and Afghanistan. References Deane, H. (1999). The Korean War. San Francisco, CA: China Books and Periodicals, Inc. Huston, J. A. (1988). Outposts and Allies: U.S. Army Logistics in the Cold War. New Jersey: Associated University Press. Malkasian, C. (2001). The Korean War. University Park, IL.: Osprey Publishing. Shrader, C. (1995). Communist Logistics in the Korean War. Westport, CT: Greenwood Press. Millet, A. R. (1997). The Korean War. Seoul: Korea Institute of Military History. Sandler, S. (1999). The Korean War: No Victors, No Vanquished. Kentucky: University of Kentucky Press. Rottman, G. (2002). Korean War Order of Battle. Westport, CT: Praeger Publishers.            

Tuesday, July 30, 2019

Principal Agent Conflict

2. Explain several dimensions of the shareholder-principal conflict with manager-agents known as the principal-agent problem. To mitigate agency problems between senior executives and shareholders, should the compensation committee of the board devote more to executive salary and bonus (cash compensation) or more to long-term incentives? Why? What role does each type of pay play in motivating managers? There are several dimensions to the principal-agent conflict.Principal-Agent Relationships exist whenever one person or party works in the interests of another party. The owner (the principal) hires and often delegates decision-making authority to professional managers (the agent) to perform tasks on his behalf. The challenge for the principal is to create an environment in which the agent has incentives to align their interests with those of the principal. The principal typically creates incentives for agents to act as the principal wants.The principal-agent conflict acerbates when th e incentive system creates a conflict of interest, the principal cannot ensure the agent is performing exactly the way the principal would like and due to the intrinsic unobserved managerial effort and the presence of random disturbances in team production. The lack of information shared between the two makes it impossible and expensive for the principal to monitor the decisions and performance of the agent.The agent usually has less to lose than the principal; therefore they often seek acceptable levels of profit and shareholder wealth while pursuing their own self interests. The uncertainty and risk includes the principal not knowing the extent to which the contract has been satisfied and they end up paying agency costs. To mitigate agency problems between senior executives and shareholders, the compensation committee should devote more to executive salary and bonuses (cash compensation); dependant on the level of cooperation between the executives and the board.If the board is ab le to secure the cooperation of the executives through higher salary and bonus, such action is acceptable. In addition, if the board can set up a system of monitoring the executives so that the executives make the effort required to further shareholder interests. Monitoring improves executive performance and can be combined with cooperation. If long term incentive schemes are used then there is isk that the organization may not make profits or the financial outcomes on which the incentives are based may not take place. When negotiating with managerial talent, the high risk of incentives keeps reputed managers away from the company. Top managers want to be certain of the compensation they will receive. Incentives are supposed to motivate managers to make more efforts, take responsibility, and achieve more. However, the insecurity of incentives reduces the motivation of managers.They feel insecure when the bulk of their compensation is incentive based. The role of higher executive sal ary and bonuses are to provide security to the top managers and motivate them. Overall, executive salary and bonuses based on negotiation with board members should reduce shareholder-manager conflict. There should be cooperation between the board members and the executives. A mechanism for monitoring executive performance will go a long way in improving the alignment of executive action with shareholder interest.

Monday, July 29, 2019

Audit Committee Effectiveness and Fees

The research is about gender and audit committee effectiveness and fees. The study will discuss the research topic in detail along with the views of other authors regarding the research topic. Apart from that, research questions are set for the research topic, which is considered as the base of the research process. The research proposal will describe a detailed conception about the gender representation in the audit committee effectiveness in controlling audit fees. The research methodologies that will be used in conducting the research are mentioned in the research proposal. A section of ethics is done so that the research maintains the ethical considerations. Data collection methods and data analysis methods that will be used in conducting the research process will be mentioned in the research proposal. The research outcomes are important while proceeding the whole research so that the conclusion can be derived easily. The research topic is gender representation in audit committee effectiveness and fees. It is an important topic for research, that has vital significance in the corporate world. Audit committee is present in every big multinational company. The role of audit committee is to control the internal functions of the company and management activities. The audit committee effectiveness depends on successful controlling the practices and policies that are used in controlling accounting, operations and regulatory compliance of business entity. The topic has significance because it is seen that if female corporate executives are included in the audit committee, then the result of the audit is more effective. There are many positive implications of female representation in the audit committee as it is related to produce a quality audit report in order to protect the auditors from reducing audit fees and audit time. However, it is seen that female audit committee representation has impacted on t he audit fees and audit quality. According to Harjoto et al. (2015), corporate governance in terms of audit has extensive impact on the determinants of the audit delays and audit fees as it focuses on the board diligence, characteristics and expertise. However, the authors support gender diversity in the effectiveness of the audit quality and the firms in Australia. The journal article suggests that ethnicity diversity and gender diversity influence the firm’s audit delay and audit fees. Female CEOs are more sensitive than male CEOs in the corporate executive board and in the audit committee. Therefore, it is responsible for women in some sensitive cases of market pressure and audit delay. As per Beck and Mauldin (2015), there are many regulations that are responsible for negotiating and determining the audit fees. The article illustrates that CEOs and other members of the audit committee irrespective of gender are in charge of controlling the regulations of the audit report formation. In the time of recession, it is seen that the audit fees are seem to be reduced in larger amount. CEO of a company and the audit committee members has more or less same power regarding the power of negotiation of audit regulations and audit fees. However, CEO has more power in some aspects in the perspective f rules and regulations (Sun and Liu 2014). As stated by Huang et al. (2014), the female CEO and higher executives that are associated with the audit committee of the organizations are recognized in terms of higher audit fees. It can be seen that CEO controls the implication of the policy in the effectiveness of the audit committee. However, female CEOs are though sensitive in many issues but are efficient in many activities of communicating with the employees before making an audit report. Many employees of the organizations support female executives in the audit committee for efficient audit report. According to Xiang et al. (2015), women who are associated in the audit committee and board of directors of Chinese organizations have significant impact on reducing the audit fees. The relationship of the gender diversity and the audit fees has a direct relationship that has a positive impact on the different activities of management. It is seen that when the management of the company is weak, then the gender diversity is associated with very less amount of fees. It can be said that audit committee is formed in a voluntary process that is different from that of developed countries of United States and United Kingdom. The cultural difference is a perspective where the developing countries are different from that of developed countries. There is a condition that the Chinese business women faces some issues while dealing with the internal business issues with the developed countries (Pucheta?Martà ­nez and Garcà ­a?Meca 2014). There are some limitations related to the research. The literature gap of the research is that the women in the business world face some issues in the audit fees in some aspects. However, the different views of the authors related to the gender biasness in the CFO level and in the CEO level are not sufficient to describe the fact of the equality in the audit committee. On the other hand, it can be said that the audit are important for multinational companies so that they can correct the wrong steps or the ineffective steps in the formation of audit committees. The research questions of the research are as follows: What is the impact of gender diversity in audit committee effectiveness? What is the impact of the female inclusion in enhancing the audit quality? What is the role of gender diversity in reducing the audit fees in the big multinational companies? Research methodology is defined as the theoretical analysis, systematic methods that are applied in the particular field of study. Research methodologies usually encompasses the analysis of principles of methods postulates and rules that are employed in the course of discipline of a research (Buckley and Waring 2013). There are different kinds of research such as applied research, basic research, problem solving, problem-oriented research, quantitative research, and qualitative research. In this research, quantitative research methodologies will be used for conducting the research regarding the gender inclusion in audit committee effectiveness (Coleman and Ringrose 2013). Quantitative research methodology is the best method of research that will yield to most effective result in this situation. Quantitative research methods include simple calculations, statistics of the data collected from different types of sources regarding the research topic. Inclusion of mathematical theories in the research methods will develop a relation between the empirical observations and the mathematical representation (Jonker and Kosse 2013). The use of statistics will increase the validity of the research outcomes that will be gained after conducting the data analysis and research process. Apart from that, secondary research methods will be used for completion of the research. It is seen that implementation of the proper research methodology will enhance the enrichment of the research outcomes (Takhar-Lail and Ghorbani 2015). Research process is defined as the process adopted the conductor of the research while conducting the whole research. Research process is a vital aspect that illustrates the way of completing the steps chosen for proceeding the research. After choosing the research topic, then the research methodology is selected. The research methodology suggests the process of data collection and analysis of the research. The data will be collected from secondary sources. It is very important to determine the research process so that the whole research can be checked in the process. There are four stages of research processes. They are inquiry, collection, organization and presentation (Buckley and Waring 2013). The process of searching the actual methods of research methodology is included in the category of inquiry. Collection includes the methods of data collection whereas the organization represents the data analysis process that is a vital aspect of the research process. It has to be kept in m ind that there should be no errors in the process of analyzing the data so that the research outcomes satisfy the purpose of the research and answer to all the questions of the topic. The last stage is presentation. It represents the presentation of the completed tasks in the whole research (Lewis 2015). Data collection is defined as the process of collection of data for conducting the research. There are many types of data collection methods that are used by the observers in order to collect credible sources. The quality of the research outcomes depend on the quality of the data collected for the research. In this research, secondary data collection methods will be implemented. Secondary data includes scholarly articles and journals. The research topic that is being chosen has immense importance in business research topic (Creswell 2013). However, conducting primary methods of data collection will be a constraint while proceeding with the research. Secondary data will provide credible data that will help in analyzing the data in order to reach at a conclusion. However, data collection will be conducted at a regular interval that can serve the management purpose. Primary research methods are also included so that it can validate the secondary data that is being collected from the dif ferent executives associated in the multinational organizations of Australia (Cohen et al. 2013). Apart from the data collection methods, data analysis of the research will be done by using the methods of quantitative analysis such as standard deviation, median and descriptive statistics. However, a new form of data analysis can also be used. The McKinsey consultants have developed an approach known as MECE principle or hypothesis testing can also be used for getting the answers of the research questions (Ã…kerlind 2012). The expected research outcomes will support the intervention of female executives in the audit committee effectiveness. Apart from that, the quality of the audit will also be enhanced if females are included in the audit committee in the big multinational organizations. If the research methodologies are implemented in the research process properly then it is expected that the research will provide an enriched analysis of the research topic regarding gender diversity in audit committee effectiveness and in audit fees (Sultana et al. 2015). The research process that is explained in the research process section is a vital aspect that will validate the research result. However, the expected outcomes of the research will support the gender diversity in formulating audit reports quality. The primary mentor or supervisor of the research is the teacher or guide in the university. The supervisor has chosen the research topic that will help the readers in order to gain an idea regarding the audit committee effectiveness and role of the female corporate executives in the audit committees of multinational organization. Apart from that, the supervisor has provided an ethical checklist that will maintain all the ethical considerations of the research process (Nicol?escu 2013). The research proposal for gender diversity is the in terms of audit committee effectiveness and audit fees are explained in detail. Various types of research methodologies that is present, among them quantitative research methodology is being selected for obtaining an enriched data regarding the topic. It is mentioned in the research proposal that the research will be conducted using the data collected from both primary and secondary sources. The credibility of the data depends on the sources that have been collected from trusted sources like Google Scholar. However, an ethical checklist is being filled so that they can fulfill the ethical considerations that are compulsory for conducting the research. It will be filled in the Appendix section of the study. Ã…kerlind, G.S., 2012. Variation and commonality in phenomenographic research methods.  Higher Education Research & Development,  31(1), pp.115-127. Beck, M.J. and Mauldin, E.G., 2014. Who's really in charge? Audit committee versus CFO power and audit fees.  The Accounting Review,  89(6), pp.2057-2085. Buckley, C.A. and Waring, M.J., 2013. Using diagrams to support the research process: Examples from grounded theory.  Qualitative Research, p.14. Cohen, L., Manion, L. and Morrison, K., 2013.  Research methods in education. Routledge. Coleman, R. and Ringrose, J. eds., 2013.  Deleuze and research methodologies. Edinburgh University Press. Creswell, J.W., 2013.  Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications. Harjoto, M.A., Laksmana, I. and Lee, R., 2015. The impact of demographic characteristics of CEOs and directors on audit fees and audit delay.  Managerial Auditing Journal,  30(8/9), pp.963-997. Huang, T.C., Huang, H.W. and Lee, C.C., 2014. Corporate executive’s gender and audit fees.  Managerial Auditing Journal,  29(6), pp.527-547. Jonker, N. and Kosse, A., 2013. Estimating cash usage: The impact of survey design on research outcomes.  De Economist,  161(1), pp.19-44. Lewis, S., 2015. Qualitative inquiry and research design: Choosing among five approaches.  Health promotion practice, p.15. Nicol?escu, E., 2013. Developments in corporate governance and regulatory interest in protecting audit quality.  Economics, Management, and Financial Markets, (2), pp.198-203. Pucheta?Martà ­nez, M.C. and Garcà ­a?Meca, E., 2014. Institutional investors on boards and audit committees and their effects on financial reporting quality.  Corporate Governance: An International Review,  22(4), pp.347-363. Sultana, N., Singh, H., der Zahn, V. and Mitchell, J.L., 2015. Audit Committee Characteristics and Audit Report Lag.  International Journal of Auditing,  19(2), pp.72-87. Sun, J. and Liu, G., 2014. Audit committees’ oversight of bank risk-taking.  Journal of Banking & Finance,  40, pp.376-387. Takhar-Lail, A. and Ghorbani, A., 2015. Market Research Methodologies: Multi-Method and Qualitative. Xiang, R., Qin, M. and Peterson, C.A., 2015. Gender Diversity of Audit Committees and Audit Fees: Evidence from Chinese Listed Companies.  Asian Journal of Finance & Accounting,  7(2), pp.239-254.

Need to Incorporate Information Systems at Strategic and Tactical Essay - 1

Need to Incorporate Information Systems at Strategic and Tactical Level - Essay Example The research will prove to be useful for all business organizations that are eligible to implement strategic management systems in their infrastructure. It can be suitable for any organization that offers a product and service and possesses a set of competitors in the market. To analyze the performance of a strategic management system, an actual implemented system will be evaluated for its productivity and benefits to the organization. The organization that has been chosen is a regional office of a global shipping company. One of the problems that might be apparent here is that the strategic management system of the chosen company is not as productive as predicted or as communicated by them. This will mean a waste of our resources and time. Therefore another organization shall also be chosen as a backup plan in case the first organization does not provide sufficient results. One of the success factors of any MIS or strategic management system is that the top management executives of that company are fully supportive of the transition to this technological infrastructure. Therefore the sponsors in a real-life scenario would be the top management. The main contribution of this research will be to devise an effective guideline for the organizations to ensure that their strategic management system are providing benefits to them rather than just increasing their expenses and overheads. Few evaluation techniques shall be discussed that have used by organizations over the past years to evaluate their systems and then alter their way of doing business based on those results. It is also very commonly witnessed that strategic plans fail even though they have been formulated with the support of the top management and are directed towards the vision of the company. Such causes of failure will be discussed in detail. Lederer et al (1996) explained that information systems can be considered as a set of modules or applications that provide aid to an

Sunday, July 28, 2019

Social Determinants of Health and Wellbeing Essay

Social Determinants of Health and Wellbeing - Essay Example 1999). A safe environment, adequate income, meaningful roles in society, secure housing, higher level of education and social support within communities are associated with better health and well being. It is these determinants that we refer to as the "social determinants of health" (Baum F. 1999). The key determinants of health are ethnicity, cultural factors, educational attainments, economic conditions, housing, employment security and access to and use of health care services contributing together to portray socioeconomic status in the society of Canada (Raphael, D., 2006). The SODH National Conference focused on the public policy environment (income and its distribution) and not on the characteristics associated with the individuals (income and social status). There are 11 SODS they are: Aboriginal status, early life, education, employment and working conditions, food security, health care services, housing, income and its distribution, social safety net, social exclusion, unemp loyment security (Raphael, D., 2006). The approaches for SDOH are Mid-level approach are a focus on mid-level determinants of health.

Saturday, July 27, 2019

Iranian revolution Research Paper Example | Topics and Well Written Essays - 4000 words

Iranian revolution - Research Paper Example As business came up, the standards of living started to rise and the death rates began to decrease due to improvements made in the local hospitals.Pahlevi Shah introduced westernization program in the country and this to some extent help in the economic development of the country in terms of trade improvement.1 In the year 1941, the Germans wanted to seize the oil fields of Iran as they took advantage of the country’s poor developments in terms of the economy which made the country weak and could not protect itself from outside threats. However, the Soviet Union and Britain joined forces to protect the oil fields of Iran from German seizure Shah abdicated because of his Allied presence and friendliness to Alexi’s powers. Muhammad Reza Shah, the son of Pahlevi Shah took over the throne and adopted the policy of pro-Allied. The Iranian government in the year 1945 requested for the withdrawal of occupying troops since it came to word that the Soviet Union forces were in some way encouraging separatist movements in some of the Northern provinces of Iran and in 1946, the troops were withdrawn from the country. The control of the oil industry was the main reason why conflicts arose in Iran in the year 1950. The wealth that was being generated from the oil trade was so huge and this led to a major political crisis in the country since prominent people in the country started fighting for control of the oil industry.2 In 1951, Muhammad Mossadegh was appointed prime minister and his relationship with Shah was not encouraging. They kept on fighting each other and in the 1953, Shah dismissed the prime minister. Mossadegh resisted yielding and this forced Shah to flee to Rome. Riots were experienced for three consecutive days and at last Royalist won back Teheran control and this made Shah to return and Mossadegh to be jailed. Throughout the

Friday, July 26, 2019

Marketing a Blackberry Phone Essay Example | Topics and Well Written Essays - 500 words

Marketing a Blackberry Phone - Essay Example The researcher states that Blackberry is one of the most reliable cell phone manufacturing companies. It provides innovative, stylish, and reliable mobile phones to the customers. The paper tells that some of the biggest attractions of Blackberry mobile phones include enhanced connectivity, excellent camera results, and a long battery time. The present research has identified that the target audience for the new Blackberry mobile phone will be the middle-class people, college students, money spenders, young children. This paper illustrates that the phone includes all such features that a high priced mobile phone includes. According to the study conducted, the only difference is the price of the phone. This essay discusses that the price has been kept low in order to make it affordable for the people who do not enough money to buy a reliable phone. The target group is not just local customers from the United States; rather the product will be made available to international customers through online services. The author has rightly presented that the new Blackberry phone, which we are going to advertise, has a number of attractive features and qualities, which make this product different from many of its competitors. Although such features can be found in some of the latest mobile phones manufactured by other companies but they cannot meet the level of quality and reliability provided by the Blackberry 9380 GSM Cellular Phone.

Thursday, July 25, 2019

Definition essay You Pick Example | Topics and Well Written Essays - 500 words

Definition You Pick - Essay Example During this time there were numerous protests and people of a certain political persuasion demanded to â€Å"Ban the Bomb.† People felt that WMDs—especially nuclear weapons—were a kind of genie let loose from a bottle. Once loose, every country would develop nuclear weapons and everyone would hold everyone else hostage. These fears were heightened when both India and Pakistan developed nuclear weapons about 10 years ago. And when North Korea declared itself a nuclear power three years ago. Fear of a nuclear Iran continue to dominate American and Israeli foreign policy. But there is more to weapons of mass destruction than nuclear weapons. There are chemical and nerve agents, there are biological agents such as plague and anthrax. Many governments are known to maintain WMD programs and they are part of many militaries’ attack plans. On the flip side, there are many treaties in place to block their use but some countries stockpile them and use them as a deterrent. They have been used in the First World War (mustard gas), the Second World War (the bombing of Hiroshima and Nagasaki), and when Saddam Hussein used them against his own people (the Kurds), as well as in many other instances. The term entered the public domain in a very significant way during the Iraq War, when the American government said Saddam possessed WMDs and that was the main reason why they would have to invade Iraq. It was, however, very hard to finds these weapons in Iraq in the end. There were great debates at the time about whether he had an active program or whether he had dismantled it. In fact he had had a program in the past and had dismantled it, but had told everyone publicly that he still had it in order to deter his enemies. Because of the terms salience in the debate about the Iraq War, weapons of mass destruction was named word of the year in

Wednesday, July 24, 2019

Mexico4 Assignment Example | Topics and Well Written Essays - 250 words

Mexico4 - Assignment Example The target groups of rape cases are mainly young women and girls who form the economic underclass of society and work in factories that pay low wages. Sexual murders and unexplained disappearance of women and young girls rank highest in Mexico vis a vis other North American countries according to Statistics by Human Rights Organizations and lobby groups. Chihuahua, Chiapas and San Salvador are places most affected by these cases. Efforts to salvage the rights of women in Mexico have had a plunge occasioned by repugnant tendencies of authorities and employers who actively and openly discriminate against women. They have adversely been mistreated as menial job workers at the Maquiladora Industrial plants; where jobs are terminated in case of pregnancy. Mexicans are considered to be reasonably religious, a situation that has contributed to several States pronouncing abortion as illegal (Wickam-Crowly & Eckstein, 2003). To this end, the jury is still out on whether this enacted law is a violation of the rights of women. Public outcries and sustained protests by Women rights activists led the Government to create the National Commission for Equality between Men and Women, CNDH, to look into social, legal and economic issues that were unfair to women. It also has programs that seek to empower women through teaching them their legal rights and training on ways to achieve sustainable livelihoods. Reproductive healthcare remains an issue of debate as most anti-abortionists see it as the platform used to legalize abortion (Wickam-Crowly & Eckstein,

Tuesday, July 23, 2019

Financial Markets - Understanding Stock Option Information Essay

Financial Markets - Understanding Stock Option Information - Essay Example â€Å"Technical analysis is the study of specific securities and the overall market based on supply/demand relationships.† (Page 1, International encyclopedia of Technical Analysis, Joel G Siegle, Jae K Shim, Anique Quereshi, Jeffrey Brauchler.) Charts and Graphs are the technician’s tools. They interpolate data and decide using graph trends, volume count, and 50 and 200 day moving average charts. To understand patterns one must observe carefully the breadth and movement of the market. Understand how accumulation or distribution (Accumulation, the buying of stock, distribution is the sale of stock.), forecast the future expectation of stocks or options. (Ascending and Descending tops P. 15 International Encyclopedia of Technical Analysis Page 15 and 16,), these illustrations show ascending and descending price top transitions, from time period- to- time period, that trail stock directions. Volatility charts show extremes —specifically, option volatility charts sh ow relationships between puts, calls, strike prices, and expiration dates. Assumption associations are derived from historical patterns, price patterns, and supply and demand relationship. Historical relationships signal the likeness of direction, whereas, price patterns point to quantity of decrease and increase. â€Å"Market factors (Interest rate changes, economic conditions, political factors, announced pending acquisitions.), are already incorporated into current market price per share. If demand exceeds supply, the stock price will increase, and vice versa.†

Active Versus Passive Mind Debate Essay Example for Free

Active Versus Passive Mind Debate Essay Étienne Bonnot de Condillac an 18th-century French philosopher contended that the senses are the foundation for all ideas and other functions carried out in the mind. Another prominent French philosopher, Renà © Descartes supported the Rationalistic theory; an explanation of behavior based on logic that has nothing to do with the senses. Condillac’s Sensationalism premise and Descartes theory of Rationalism serve as fuel for the classic active versus passive mind debate. The passive mind theory suggests that all learning occurs through the experience of sensations, in the absence of voluntary mind control processes, while the active mind theory claims the exact opposite; that individuals actively focus certain mental processes on the subject matter and the senses play no part in the process. Descartes also believed that sensory data was inclined to be false and was therefore useless, suggesting that mathematical deduction was the only path to the truth. Justin Skirry 2008 I believe that both theories have some validity. The problem arises for me with the use of the word all by Condillac, and the use of the word only by Descartes, which is what takes the theories from the moderate part of the continuum to the extreme. Sensory learning is of course a proven fact, but it is also a fact that active learning occurs as well. It is not unusual for a philosopher to be both a sensationalist and a rationalist at the same time. I tend to trust my deductive powers of reasoning more than my senses, because many outside forces can alter the senses. Take emotion for instance, I am aware of the role unchecked emotions can play in faulty decision-making. I have learned not to make important decisions when I am in a highly emotional state.

Monday, July 22, 2019

Rage Against Machine Three Rebels Essay Example for Free

Rage Against Machine Three Rebels Essay The protagonists of the novels Emma by Jane Austen, My Name is Asher Lev by Chaim Potok, and The Adventures of Huckleberry Finn by Mark Twain all share a rebellious streak that both serves them well and causes them trouble in their respective novels. However, these protagonists didnt operate with a wild disregard to the rules of their society and times. Rather, all three characters are constrained in the end by the mores of Victorian England, Orthodox Jewish society and 19th century Southern values respectively. Exploring such aspects of Emma, My Name is Asher Lev, and The Adventures of Huckleberry Finn, as theme, historical context, and psychological traits, it will be shown that despite Emma Woodhouses disdain for the institution of marriage, Asher Levs living in the two seemingly opposite worlds of art and Jewish society, and Huckelberry Finns lack of respect for social refinement and rules, the three protagonists did not entirely succeed in their goals of living lives that went against the grain of their societies. Emma Woodhouse was described in the pages of Emma as a â€Å" handsome, clever, and rich † (Austen, p. 1, 1816) young woman who was the apple of her doting fathers eye and the mistress of Hartfield, their family estate. Taking credit for the union of her former governess and a Mr. Weston, Emma decided to further hone her â€Å"matchmaking† skills by setting up her friend Harriet Smith with various men of higher social status. This interest in Harriet Smiths marriage prospects directly contradicts Emmas own quest to remain single in a society that offered women only bleak alternatives to marriage. Despite Emmas twin resolves to remain single and find Harriet a suitable mate, Emma eventually caved into the demands that were made on women of high social status when she gets engaged and realized that Harriet marrying a farmer named Robert Martin would forever alter their relationship. Asher Lev, the protagonist of My Name is Asher Lev, had loved to draw ever since he was small. His father, an important figure in the Ladover community, tried to discourage his son from getting too serious about his art while his mother implored Asher to draw pictures that were â€Å"pretty†, an assault to her sons melancholy artistic temperment. Despite reading in an art book that an artist should be free of religion, country, etc, Asher decides that he will try to balance being a devout Jew with being a passionate artist. Under the guidance of Jacob Kahn, a non-practicing Jewish artist, Ashers art and his knowledge flourishes as he explores the use of crucifixes in his work. Asher is uneasy about showing the crucifixion pictures in a show, but he goes through with it, being true to his calling as an artist. The crucifixes ultimately prove to be Asher Levs undoing as he is shunned by his parents and the Ladover community in general. Huckleberry Finn, the protagonist in The Adventures of Huckleberry Finn, is an adolescent boy who enjoys looking for trouble with his friend Tom Sawyer way more than trying to become a civilized boy at the hands of the widow and Miss Watson. After running away from his drunkard father, he decides to travel with Jim, who left Miss Watsons house after he found out that Miss Watson was thinking of selling him. Even though Huckleberry Fin grows attached to Jim, he harbors doubts throughout the story about hiding a runaway slave. He even thinks about turning Jim in before deciding that having a conscience just wasnt worth the mental agony of losing his friend. In the end, the protagonists rebellious act of helping a slave escape his captors prove to be for nothing as Miss Watson, his former master, decides to set him free. All three novels have themes that somehow relate back to rebellion or freedom. In Emma, the protagonist told her friend Harriet Smith that she never intended on getting married, a bold pronouncement in Victorian England. Her reasons are simple: â€Å"Fortune I do not want; employment I do not want; consequence I do not want; I believe few married women are half as much mistress of their husbands house as I am of Hartfield † (Austen, p. 74, 1816) What Emma was saying was that her social status allowed her the freedom to chart her own course throughout life, an option given to few women at the time. Another way that Emma tried to rebel against the social customs of Victorian England was to find her friend Harriet a mate of high social status. Since Harriets bloodline was unknown, most people would have scoffed at a pairing of Harriet with a man like Mr. Elton or Frank Churchill. Mr. Knightley echoes this sentiment when talking to Mrs. Weston: â€Å"Hartfield will only put her out of conceit with all the other places she belongs to. She will grow just refined enough to be uncomfortable with those among whom birth and circumstances have placed her home. † (Austen, p. 31,1816) Freedom is the overarching theme of The Adventures of Huckleberry Finn. At the beginning and end of the novel, the protagonist yearns to be free from the rules and civilization of 19th century polite Southern society. For a boy that seemed to be hemmed in by clean clothes and spelling lessons, floating on a raft must have seemed like heaven: â€Å"Other places do seem so cramped up and smothery, but a raft dont. You feel mighty free and easy and comfortable on a raft. † (Twain, p. 134, 1985) The novel even ends with Huckleberry Finn promising to run away looking for more adventures, claiming that he â€Å"been there before† (Twain, p. 296, 1985) with the civilized life. One of the themes of My Name is Asher Lev is the protagonists struggle between life as a devout Jew and life as an artist dedicated to his craft. This battle is evident on the first page as Asher Lev introduces himself to a reader that is already familiar with his work. In this passage, Asher tears himself apart yet defends himself at the same time, showing uncertainty years later with his decision to show the crucifixes: I am an observant Jew. Yes, of course, observant Jews do not paint crucifixions. As a matter of fact, observant Jews do not paint at all-in the way that I am painting I am a traitor, an apostate, a self-hater, an inflicter of shame upon my family Well, I am none of those things. And yet, in all honesty, I confess that my accusers are not altogether wrong; I am indeed, in some way, all of those things. (Potok, p. 1, 1972) It was established earlier that Emma rebelled against Victorian society by resolving to stay single and fix up her friend Harriet with a man above her social status. As the novel ended with Emmas engagement to Mr. Knightley and Harriets engagement to Robert Martin, Emma realized that rebellion wasnt quite her cup of tea, deciding to let her friendship with Harriet fall to that of social goodwill: â€Å"The intimacy between her and Emma must sink; their friendship must change into a calmer sort of goodwill † (Austen, p. 435, 1816) At the start of the novel, Emma wanted to live her life according to her rules, but by the end became caught up in the social mores of Victorian England. Sharing the psychological trait of rebelliousness with Emma Woodhouse, Huckleberry Finn did everything he could to escape the stifling life of rules and convention, even traveling the length of the Mississippi River with a runaway slave. However, the protagonist almost gave in to social conventions several times when he seriously thought about turning Jim in to the authorities. Huckleberry Finn even wrote a letter to Miss Watson telling her of Jims whereabouts, feeling better afterward. However, as Huckleberry Finn thought of all the things that Jim had done for him, he tears up the letter, saying â€Å"All right, then, Ill go to hell† (Twain, p. 223, 1985) The rebellious streak in Asher Lev started early. Even at a young age, Asher was willing to defend his gift, no matter the situation. For example, when Asher was called into the mashpias office for drawing a sinister picture of the Rebbe, Asher boldly stood up for his art to his disapproving father, something a polite Orthodox Jewish kid did not do in those times: â€Å"Foolishness is something thats stupid Foolishness is something a person shouldnt do. Foolishness is something that brings harm to the world. Foolishness is a waste of time. Please dont call it foolishness any more, Papa. † (Potok, p. 129, 1972) Like Huckleberry Finn, Asher Lev knew how he wanted to live his life at a very young age. Also like Huck Finn, Asher was willing to thwart social conventions in order to communicate this. Despite the rebellious streaks of Emma Woodhouse, Huckleberry Finn, and Asher Lev, the time periods in which the three novels take place largely serve to mute the three protagonists individuality. In Emma, for example, women of her class were expected to be married. Those who didnt were largely seen as pathetic beings on which to take pity. The character of Miss Bates was presented as a ridiculous character, seen as a clown-like figure by Emma and others, and seen as an object of sympathy such characters as Mr. Knightley. Even Harriet Smith saw Miss Bates as someone to be pitied. However, Emma, Harriet, and even Jane Fairfax, thought to be doomed to a governess position, escaped Miss Bates fate by marrying according to the social customs of Victorian England. Rebellious in her youth, Emma realizes the â€Å"error† of her ways and did her womanly duty. The vile tradition of slavery provided a subtle color to The Adventures of Huckleberry Finn. Yes, the protagonist became close friends with a runaway slave. However, it was obvious that Huckleberry Finn was conflicted about this friendship. One example of this conflict occurred when the protagonist meets his friend Tom Sawyer , who was on his way to visit relatives. When Tom suggests that they steal Jim away from the Phelps farm, Huckleberry Finn is flabbergasted: â€Å"Well, I let go all holts, then, like I was shot. It was the most astonishing speech I had ever heard-and Im bound to say Tom Sawyer fell, considerable, in my estimation. † (Twain, p. 235, 1985) In other words, it was ok for Jim to travel with Huck when they were in no danger of getting caught. Once caught, Jim was no longer Hucks problem. He was even surprised that anyone would go to the trouble of breaking the law to help a slave escape. Huckleberry Finn wasnt a bad person. He was just a victim of pre-Civil War America. Growing up an Orthodox Jew who was also a gifted artist in the mid 20th century was a unique situation for Asher Lev. Throughout My Name is Asher Lev, the protagonist had tried valiantly to combine being a devout Jew with being an even more devout artist. He observed the Jewish faith despite studying under a non-practicing Jewish artist and living in Europe for a while. At the end, something had to give in Ashers struggle between Judaism and art, and it ended up being his place in the Ladover community. As Asher walked down the street after the Rebbe cast him out of the community, he contemplates his life thus far: â€Å"I was demonic and devine Asher Lev was the child of the Master of the Universe and the Other Side. Asher Lev paints good pictures and hurts people he loves. † (Potok, 367, 1972) From this passage, one can see how Asher Lev wondered whether the sacrifice was actually worth the love of his parents and his community. The protagonists of Emma, The Adventures of Huckleberry Finn, and My Name is Asher Lev all sought to do things that were not really done in their times. Emma Woodhouse sought to raise the social status of her friend by marriage while remaining single herself in a time when both acts were looked down upon. Huckleberry Finn wanted to escape civilization while bringing along a runaway slave for company. Asher Lev wanted to combine the life of faith with the life of art in a time when no one would even think about the two concepts together. Ultimately, the times of the three rebel protagonists proved to be too much, dulling their mutinous acts.

Sunday, July 21, 2019

Can Migration Flows Be Considered A Security Issue Politics Essay

Can Migration Flows Be Considered A Security Issue Politics Essay For quite some time now, issues of migration flows and security have become concern for many leading ministers, politicians, the media and the electorate of the host countries. They have dominated politics and social sciences literature and surprisingly became a major contemporary theme in the main field of International Relations and its subcategories of international and domestic politics, international security studies, and human security. In many Western states, an abundance of anti-immigration campaigns appeared. For example, we see right-wing political parties who oppose migration on the ground that it poses a direct threat to their identity and security; therefore they demand tougher policies and restrictions on migration flows. This essay begins by discussing the historical background of migration with references to some of European countries. Then, it will explore the symptoms of migration, refugees and asylum seekers in the framework of the possibility that it may pose a di rect threat to security in Europe. After establishing the different links between migration and security, the essay will focus on the development of treaties, policies and measures undertaken by the European countries in order to tighten up their security borders against unwanted immigrants, combat illegal and irregular migration, human trafficking and smuggling. Finally, the essay will provide a personal view, arguing that migration flows can be considered a security issue. Migrations by people in large groups or individuals across vast distances are by no means a recent phenomenon. The term migration can be defined as the movement of people from one place to another. (Migration and European Culture). Two types of human migration are very common: first, internal migration, and second, international migration. A good example of internal migration is the movement from England to Scotland. A good example of international migration is the movement from Congo or Rwanda to America, Australia or Europe. The causes for migration can be divided into two main categories, the push and pull factors. Push factors such as, civil war, poverty, climate changes and political or religious oppression. Pull factors are for example, a chance of a better standard of living in general as well as political and religious freedom (Migration and European Culture). Historically, between the seventeenth and nineteenth centuries migration to North America from all parts of Europe and by Protestant and Catholic alike emigrated to North America, New Zealand, Australia, South America, and southern Africa (Wolffe, 2004, p. 98). Undoubtedly, religious, cultural and political conflicts were inevitable between the new comers and the indigenous people in the New World. Buzan contends that a threat to population can arise from human migrations especially when the incoming population is of a different cultural or ethnic stock from that already resident (Buzan, 1991, p. 93). Notwithstanding, migration has dominated the security agenda in the recent years mostly due to the unprecedented scale of the phenomenon that about 20.5 million foreigners living in Western Europe at the beginning of the twenty-first century (Kicinger, 2004, p. 1). But what is migration? What is security? What are the main aspects of the migration-security link? These contested question s have no easy answers. According to Huysmans and Squire scholars have opened up a range of other challenging questions that are important to the analysis of the migration/security nexus (Huysmans and Squire, 2009, p. 11) questions such as should migration be named a security threat? At which level it should be met national or at international level such as the EU? Is migration already a threat or only a challenge to security? (Kicinger, 2004, p. 3). Migration in Europe appeared in the years between the two World Wars. After the First World War, the refugee problem emerged in Europe as a result of the turmoil created by the break-up of the Ottoman, Austro-Hungarian and Russian Empire, which led to the displacement of more than 20 million people (Turton, 2002, p. 28). After the Second World War, Europe was in crisis regarding shortage of laborers and desperately needed extra hands in the form of temporary immigrants laborers to rebuild Europes devastated cities. Hansen argues that i n Europe, during the 1950s and 1960s, France, Switzerland, and Germany facilitated, through guest worker programmes, wanted temporary migration (Hansen, 2000, p. 4). Since the 1970s, many of the temporary migrant workers did not go home. However, they encouraged their families and invited them to join them in the host countries as family reunification. For the anti-migration campaigners, this family reunification is an exploitation of migration policies and procedures as they argue that migration is considered unnatural, and as something to be feared. The migrant as an outsider is viewed with considerable suspicion as to his/her intentions that are thought to be dubious (Gupta, 2005, p. 115). Furthermore, these same groups exacerbate the problem of xenophobia especially towards ethnic minorities who have already settled in the host countries as genuine refugees and / or asylum-seekers. Scholars such as Ireland believe that migration in Europe is a complex process but Europeans today live in societies that have become truly multicultural (Ireland, 2000, p. 234). The issue of multiculturalism in Europe caused controversy in the realm of politics, s ocial sciences and security studies. Boswell suggests that while a multicultural approach implies tolerance of cultural and religious diversity, robust anti-discrimination legislation, however this approach came under criticism for failing to deal adequately with the challenges of integration (Boswell, 2005 p.10). For some, like the anti-migration campaigns and right-wing political parties, the phenomenon of multiculturalism started with mass migration of people who came from different backgrounds, cultures, religions and identities. One can argue that these, and other, factors may have caused direct threats to the security of the host countries and jeopardized European values, such as national heritage, cultural identity and social cohesion (Vaughan-Williams and Peoples, 2010, p. 136). The European governments feared that the mass migration may threaten social stability in Europe. In addition, mass migration created xenophobia which hampers both assimilation and integration. Furthermore, it may play an important role in demographic security and implies that migration exacerbates the problem of population increase in Europe. Regarding internal security, governments fear that migrants would get involved in dealing with drugs, crimes, trafficking and smuggling in human beings activities, making use of all channels available both legally and illegally. Guild states that the image of the foreigners as a security threat because of his or her propensity to commit criminal offences is often seen in the press in many EU countries (Guild, 2009, p. 115). Cultural identity is another factor raised with respect to the issue of security. The issue of hijab (headscarf), Burka, and veil, for example, angered the hard core right-wing parties especially in France and other European countries (Holland, Germany, Austria and Belgium ) which eventually led to social and political clashes with Muslim communities Throughout the 1980s, migration control especially on refugees and asylum seekers did become a hot topic in both political arenas and domestic public debates in European countries. Weiner sums it up, saying, migration and refugee issues are now matters of high international politics, heads of states, cabinets, and key ministries involved in defence, internal security, and external relations (Weiner, 1992 1993, p. 91). The result of political debate was that opinions polarized and refugees often made the headlines articulating theatrical language and were negatively portrayed for racial policies (Huysmans, 2005, p. 11). It is worth mentioning that the breakup of the former Soviet Union and the fall of the Berlin wall in 1990, provided fresh impetus for migration from Eastern Europe which became an easy gateway to the West, both for people from the former communist countries themselves and asylum-seekers transiting from further afield (Telà ¶ken, 1999). As the pressure mounted on gov ernments to focus on migration control, many Western governments have tightened up their security borders against refugees and asylum seekers. Warner contends that gate keeping has become the primary state function†¦ the state must protect its borders because that is what states do (Warner, 1997, p. 60). Quite often, refugees and asylum seekers are portrayed as a burden and hazardous to the European culture, identity, and pose threats to social, economic and internal security. They are potential threat to collective security and can be located within a security continuum that connects it with issues such as terrorism and international crime, (Guild, 2009, p. 132-133 and Vaughan-Williams and Peoples, 2010, p. 136). Although migration and refugee issues have caused severe headaches for some politicians, ministers and governments, others have used such issues as a political propaganda to win electorate votes. For example, in August 2001, the Australian Prime Minister John Howard transferred many refugees, mainly Afghans who were rescued in the sea by a Norwegian freighter, to detention centres in a Pacific island (Nauru and Manus) rather than to Woomera (detention centre for refugees and asylum-seekers) in Australia. This move consolidated the Prime Minister and his coalition back into power for the third successive time†¦ issue of refugees played an important role in securing this electoral victory and made refugee policy†¦ a highly visible political issue (Huysmans, 2005, p. 36-37). In the same vein, Weiner contends that the very form and intensity of response to unwanted migrations is itself an indication that such population flows are regarded as threats to security or stability (Weiner, 1992 1993, p. 125). In the same direction, in an article by Annika Savill in The Independent, which was published on Wednesday 16 September 1992, Douglas Hurd, the Foreign Secretary at the time, produced outstanding examples of migration as a security issue: Mr Hurd said that many of his European counterparts considered that migration among all the other problems we face is the most crucial. Like the US of the 19th century, Europe is a magnet for people seeking greater opportunities, from the east and south . . . We have already seen, most obviously in Germany but also elsewhere in the Community, the tensions and antipathies which can result from the inflow,. But he warned that unlike 19th-century America, ours is not an empty continent (Savill, 1992). What is security? Security is an ambiguous and a contested concept which most of the literature that attempted analysis or prescription was, and to some extent still is, based on the concepts of power and peace (Buzan, 1991, p. 2). Many readers associate the word security with topics such as, military threats, war, international relations, diplomacy and strategic studies. Arguably, this general understanding of the concept has monopolized security and military studies throughout the Cold War era. Guild contends that security cannot be reduced to one element, but it can only be understood in relation to power either more power provides more security or security is based on relationship among actors and thus not a commodity at all (Guild, 2009, p. 6). But for Buzan and some international relations scholars this concept is too narrow and vague, therefore they demanded to develop and stretch the concept of security beyond such well known traditional topics. In the aftermath of the Cold War, some prominent scholars of the Copenhagen School, including Buzan, Waever and others, argued that the concept of security could be expanded†¦From 1980s onward a more general sectoral widening of security included societal, economic, environmental, health, development and gender (Buzan and Hansen, 2009, p. 13). With time and space, the available literature on migration and security has increased considerably. However, the term security has evolved and undergone significant changes to include more political, economic and social dimensions such as, environmental degradation, pandemic diseases (HIV/AIDS), transnational organized crime and international migration. Cottey suggests that security therefore is not something that can be objectively defined or of which there is likely to be an agreed definition (Cottey, 2007, p. 7). Scholars such as Mayron Weiner was the first to address the relationship between immigration and security issues, other scholars indirectly captured this linkage in their work on immigration and refugees in the US policy (Lahav, 2003, p. 90). In order to combat illegal migration in Europe and deal with unwanted mixed flows of refugees, asylum seekers and others who were using illegal routes to beguile the migration system and restrictions, various and tougher measures of migration security were introduced by the European governments to prevent the abuse of the system. Taylor claims that the measures are contained in the Hague Programme, a five-year plan for the field of freedom, justice and security (Taylor, 2005). Some of these measures, for example, aimed at preventing asylum seekers from arriving at the states border in the first place, send asylum seekers back to countries through which they had passed, encourage member states of the EU to apply the refugee definition more narrowly and apply deterrence, such as the increasing use of detention, and restrictions on the right to work and access to social welfare (Turton, 2002, p. 42). Politically speaking, these measures on migration, refugees and asylum seekers played a n important role in bringing member states of the European Union even closer to the union than before. The member states of the European Union went further regarding restrictions and policies on migration, refugees and asylum seekers. Metaphorically speaking, they wanted to build one strong Fortress in Europe with a solid iron-gate as a security protection against immigrants and mixed flows of refugees. Taylor contends that at the end of 2004, the European Union (EU) agreed further measures strengthening Fortress Europe. Ministers from the 25 EU member states established the basis for a common asylum system†¦ and the wider sharing of information by national police forces and security services (Taylor, 2005). Fortress Europe, in the form of treaties, conventions and steps, which have been taken by the member states of the European Union to accord their policies on immigration, is overwhelmingly tough and very restrictive. Some of the measures, which are summarized here: the 1990 Dublin Convention: its aim was to ensure that one member state would take responsibility for examining a claim, thus preventing asylum-seekers from shopping around for the most favorable country in which to ask for asylum, the 1990 Schengen Convention: its aim was to reinforce external border controls whilst allowing free movement within participating states, the 1991 Maastricht Treaty: this empowered Justice and Home Affairs Ministers to establish a framework for a European-wide asylum policy and introduced the concept of EU citizenship, the 1992 London Resolutions: ministers in London responsible for immigration approved three non-binding resolutions and conclusions and the 1997 Treaty of Amsterdam: this include s a commitment by member states to develop a common immigration and asylum policy within five years, but the treaty came into effect in 1999. (Turton, 2002, p. 42-23). Since the 9/11 attacks on the American soil, the London bombings in July 2005 and other bombings across Europe, the issue of security became once again a hot subject for debate among politicians and topped social, economic and political agendas particularly those of Western governments. Given that the 9/11 attacks were carried out by terrorists from Al Qaida and not by the refugees or asylum seekers, the European governments once again raised the issue of security in relation to migration. The European countries have maintained excessive securitisation actions within migration policy frameworks as politicians and media portrayed migrants, asylum seekers and refugees, especially from Asia and Middle East, as potential terrorists abusing immigration policies and procedures. Vaughan-Williams and Peoples argue that moves towards the securitization of migration were already well underway prior to the events of 9/11†¦ In the aftermath of 9/11 and bombings in Madrid and London, has bee n the particular focus on Muslim communities (Vaughan-Williams and Peoples, 2010, P. 137). These actions and efforts by European countries to strengthen their external borders and tighten up their immigration policies caused immense controversy in the realm of politics. On one hand, anti-migration elites have argued that these common policies and rigorous law measures are mainly against bogus asylum-seekers, refugees and illegal immigrants. On the other hand, migration supporter elites and some of the NGOs argue that these measures have caused thousands of deaths of refugees and asylum-seekers and as well marginalized, criminalized and sidelined many genuine of them (Hogan, 2002). In conclusion, migration flows opened new debates in the domain of domestic and international security and foreign relations. Over the past decades, the concept of security has significantly changed to include several other categories in the realm of politics and social sciences. This essay briefly discussed the historical background of migration and concentrated on refugees and asylum seekers as the main themes for societal and security analysis. From the essay point of views, the philosophy of multiculturalism played an important role in security, xenophobia has created racial tensions which sometimes led to violence between the host population and the immigrant communities and definitely illegal migration poses threats to the social stability and internal security of host countries in Europe. In addition, the essay agrees that the European countries have the right not only to secure their borders against illegal migration, but also to have the right to defend and protect the value s they espouse such as social stability and cultural identity. The territorial integrity, economic and political independence of the European countries need to be protected from the danger of migration exploitation. Securitization of migration is not new, but the 9/11 attacks have stirred up the process of securitization and the building up of the so-called Europe Fortress to keep unwanted immigrants out of Europe. The European countries remain the favourite destination for both legal and illegal immigrants regardless of how tight border controls are. Immigrants, refugees and asylum seekers who fear persecution at home or are intent on escaping war and poverty will keep the hopes of reaching European countries alive. Such hopes could be pipe dreams.

Saturday, July 20, 2019

Landfills in Indiana :: essays research papers

Dear City Council, The purpose of this letter is to ensure that the City Council has the most current information regarding municipal landfills. This information is critical in our efforts to maintain the integrity of our city. As the mayor of this fine town, I feel it is my duty to keep the citizens of Sullivan up to date with the most current information with regards to our city; as such I have researched landfills and compiled my findings here for your consideration. First and foremost, the construction of a new landfill is a decision which must not be entered into lightly. Many of our citizens may not even fully understand what a municipal landfill is, let alone the pros and cons of allowing the construction of one in our city. Most people, when thinking of something such as a landfill may envision what is more accurately called a dump. A dump is a place where people randomly and carelessly throw unwanted debris without regard to consequence. I, for one, would never allow a dump in Sullivan. Thankfully, there is a stark difference between a landfill and a dump and I would like to begin with a discussion of what a landfill is. A landfill is a carefully designed cavity in the ground into which wastes are deposited. The design is implemented in such a manner that there is no connection between the waste and the environment surrounding the waste. The greatest focus of the design of a landfill is placed on the avoidance of any hydrologic connectivity between the waste and the environment, or, more precisely, the groundwater. Another highlight included in the careful design is that municipal landfills are specifically cared for so that odors do not permeate the area, and so that rodents and the like are not drawn. Another important aspect of what a municipal landfill is would be what can be contained in it. According to the Indiana Department of Environmental Management, Municipal Solid Waste Landfills (MSWLFs) accept the majority of items that we commonly throw out and place on the curb for daily trash pickup, yard debris, construction/demolition materials, and some non-hazardous waste produced industrially. This definition is supported by Indiana’s Title 329 IAC 10-2-115 â€Å"Municipal Solid Waste† and Title 329 IAC 10-2-116 â€Å"Municipal Solid Waste Landfill.† It is not uncommon for advocates of a landfill to claim that â€Å"no ill effects will occur as a result of the landfill† or that â€Å"the landfill will not pollute our natural resources.

Human Resources at John Lewis use labour market information to help :: Human Resources Essays

Human Resources at John Lewis use labour market information to help them with there HR planning Task 3 Human Resources at John Lewis use labour market information to help them with there HR planning. The information allows us to look at local employment trends so they can indicate the availability of labour in certain areas, so they can see whether it is in fact easy or difficult to hire .It also can be used to see whether a large company has made employees redundant which means there will be more workers available with the skills that could be transferable to the job. Local skills shortages is another piece of valid information that Hr department find valuable as they can expand their own training schemes for employees to build up their skills. Hr feel that coming together with fellow companies and employers in the area in which is in a similar industry, can support local schools and colleges so that people can develop their skills early on. Competition for employees is important for Hr to be aware of, as they will want know whether fellow competitors are enlarging the company and will in turn have a larger demand for labour. Human resources use this information inparticualr to overview the level of unemployment within certain regions and areas. Through this there will be a higher availability of labour, and so more people can commute easily the work place. This also depends on the regions statistics, age distribution, attitudes to women working and to the extent to which young people stay at school, college or go to higher education. John Lewis’s Hr department also look at internal labour market statistics to help them develop the business. It is important to overview labour turnover as it allows them to forecast for the future, for if staff turnover is high they must recognise why this is so and then make changes to keep staff. However in some ways companies can take advantage of staff turnover as they can see it as an opening for promotions and fresh ideas from new staff. Yet at the same time losing staff is cost effective to the company as they will lose the skills and retrain new employees. Human resources feel that it is important to keep a record of the companies sickness and accident rates. This means holding records of the companies notified absences, absences due to sickness and unauthorised absences. Through this they can take a statistical analysis and use the information to identify any particular problems with a specific or group of employees. However HR then look at whether absences are due to sickness or are unauthorised.

Friday, July 19, 2019

Amyotrophic Lateral Sclerosis :: Biology Essays Research Papers

Amyotrophic Lateral Sclerosis Have you ever had an experience of morning paralysis where you see yourself lying down, and you think you're awake so you try to get up, but suddenly you realize that you can't move? I have, several times. They have been the most frustrating and scariest times of my life. As I try harder to move, concentrating all my energy into moving one arm, the deeper I seem to be sinking in this indescribable feeling of entrapment. I hear the people outside my room and try to get their attention by screaming. Instead, I hear a soft slurred sound coming from my throat. Then I start to panic. I can't breathe! My energy is depleted and my body is exhausted. Eventually, I start to relax. The first time this happened to me, a mosquito landed on my big toe while I was thinking of what to do. Without being consciously aware of it, I move my big toe. My body jerks and suddenly I can move! Thank God for the mosquito, otherwise I wouldn't have known that all I had to do was move my big toe towards me. Eve r since, whenever I would have another one of these experiences, I would relax and gently move my big toe towards me. If you've had one of these experiences, then you've probably had a glimpse of how it feels to have a fully developed amyotrophic lateral sclerosis. Amyotrophic Lateral Sclerosis (ALS), more commonly known as Lou Gehrig's disease, is a neurological disorder that involves the degeneration of motor neurons. A-myo-trophic is derived from the Greek language. A connotes something negative or none. Myo means it has something to do with the muscles. Trophic translates to "nourishment". (1) The term Lateral is attributed to the parts of the spinal cord that ALS usually affects. (2) The scarring that results from the degeneration of these neurons and nerves in the spinal cord is known as sclerosis. (2) In 1941, Lou Gehrig, a famous baseball player, died of ALS. His name has been associated with this progressive fatal neuromuscular disease ever since. (3) Another person whose name is associated with this disease is the French neurologist, Dr. Jean-Martin Charcot. He was the first to identify that motor neurons from the spinal cord are the main part of the nervous system affected by this disease, in 1869. For that, amyotrophic lateral sclerosis is also known as maladie de Charcot.

Thursday, July 18, 2019

Morality as Anti-Nature Essay

Friedrich Nietzsche stands as one of the philosophers who tackled about the complexities of human existence and its condition. It is noteworthy to state that most of his works made several standpoints to what he refers to as the Ubermensch. The conception of such is designed to inspire the individual to substantiate his existence and rouse his self-overcoming and affirmative character. This can be said to arise from the idea of creating a self through the process of undergoing a destructive condition that enables the self to acquire greater power in relation to others. The development of such a self is dependent upon the recognition of the anti-naturalistic character of morality which he discusses in The Twilight of the Idols in the section entitled â€Å"Morality as Anti-Nature†. Within the aforementioned text, Nietzsche argues that morality hinders the individual from experiencing life as it limits an individual’s freewill thereby in the process leading to the creation of an individual who is incapable of life itself. He states, morality is a â€Å"revolt against life† (2006, p. 467). It is a revolt against life as it is based on the negation of an individual’s basic instinct to act freely in accordance to his passions. According to Nietzsche, this is evident in the case of Christian morality which places emphasis on the control of the passions. Within Christian morality, an individual who is incapable of controlling his passions is considered to be immoral as he is incapable of practicing restraint upon himself. Examples of this are evident if one considers that within Christian morality, to be saintly requires restraining one’s desires and hence one can only follow the path of Christ if one denies all of his desires, the denial of which involves the denial of all worldly things. He states, within the context of this morality â€Å"disciplining†¦has put the emphasis throughout the ages on eradication†¦but attacking the passions at the root means attacking life at the root: the practice of the church is inimical to life (Nietzsche, 2006, p. 66). The practice of the church, its imposition of morality contradicts the essence of life which is the actualization of an individual’s self since it delimits an individual to one particular kind of existence. For example, Christian morality has the Ten Commandments. If an individual follows these commandments, the individual’s spiritual life is ensured in the afterworld. Nietzsche argues that by following these commandments, the individual is at once delimited to one particular form of existence. This does not necessarily mean that Nietzsche applauds acts of murder; he is merely stating that by following moral rules and moral norms the individual is at once preventing himself from the experiencing a particular form of life and hence the actuality of life itself. It is important to note that by presenting a criticism of Christian moral values and moral values in general, Nietzsche does not necessarily prescribe an individual to follow his moral code. In fact one might state that Nietzsche does not possess a moral code. He states, Whenever we speak of values, we speak under the inspiration†¦of life: life forces us to establish values; life itself evaluates through us when we posit values†¦It follows from this that even that anti-nature of a morality which conceives God as the antithesis and condemnation of life is merely a value judgment on the part of life. (Nietzsche, 2006, p. 467) Within this context, Nietzsche recognizes that the anti-nature of morality is a value in itself. It differs however from a moral code since it does not delimit an individual by prescribing actions which he ought and ought not to follow. The importance of the anti-nature of morality lies in its emphasis on the affirmation of the individual. Within the text, Nietzsche claims, â€Å"morality in so far as it condemns†¦is a specific error†¦We seek our honour in being affirmative† (2006, p. 468). It is within this context that one may understand why for Nietzsche; the Ubermensch is an individual whose choices are dependent upon the ends justifying the means since to state that one performs a particular action since the means justifies the end is equivalent to performing a particular action since the act itself adheres to what a particular moral rule considers to be ‘good’. This is evident if one considers that in order for an individual S to consider Q a ‘good’ act wherein Q is good due to P and Q necessarily follows from P, it is necessary for P to be good within the context of a moral norm M. For example, a person may consider giving alms to the poor good since the act of giving alms itself is considered ‘good’ within the context of a particular moral norm. As opposed to the example mentioned above, the Ubermensch acts in accordance to what may be achieved by an act [the end of the act itself] since what the Ubermensch places emphasis on is the joy that may be achieved in the act itself. Alex MacIntyre states, â€Å"joy in the actual and active of every kind constitutes the fundamental end from which Nietzsche develops his critique of morality† (1999, p. 6). Although Nietzsche’s criticism of morality and its constraints upon an individual are valid, it is still impossible to conceive of a world wherein no morality is applied. Within the context of social reality, moral norms function to ensure order within society. Although laws may function by themselves to ensure the order of society, laws themselves are dependent upon a particular moral norm which the society adheres to. References McIntyre, A. (1997). The Sovereignty of Joy: Nietzsche’s Vision of Grand Politics. Toronto: U of Toronto P. Nietzsche, F. (2006). Morality as Anti-Nature. The Nietzsche Reader. Eds. K. Ansell-Pearson & D. Large. London: Wiley-Blackwell.