Wednesday, July 31, 2019

At I essentially am not in madness Essay

â€Å"That I essentially am not in madness, But mad in Craft† Consider the importance of pretence and acting in Hamlet. Do you entirely agree with Hamlet’s claim? The idea of a character feigning madness is commonplace in great literary works; many authors use it to show the sanity of a character. Shakespeare has used this idea throughout the play, Hamlet. In this masterpiece, there is much debate around the protagonist, Hamlet, and whether his madness was real or feigned: literary scholars have debated this for more than four hundred years. Shakespeare uses a theme of madness in this play to illustrate how one must use deception in order to deceive others to reach the truth. Thus, in this play, the tragic hero contemplates his own moral judgements and in the process is considered mad. Hamlet claims to feign his madness, as he says to Horatio and Marcellus in Act 1 Scene 5, â€Å"How strange or odd some’er I bear myself- As I perchance hereafter shall think meet To Put an antic disposition on. † This quote illustrates how Hamlet intends to pretend to be mad in order to reach the truth within this court, which Hamlet describes as, â€Å"out of joint,† which once again highlights the disordered state of affairs. However, society has an even greater effect on Hamlet because his madness could be a sign of his inability to determine between right and wrong and to make appropriate decisions in the context of his society. Towards the opening of the play, in Act 1 Scene 2, Hamlet says to his mother, Gertrude, â€Å"Nay it is. I know not what ‘seems’. † Thus, Hamlet is saying he does not what it is to pretend because he only knows what it is to be. This quotation is ironic because it is the crux of the scholarly dispute: if Hamlet only knows what it is to be, then his madness must be genuine. In Shakespearian society, it was commonly believed that when an individual told a lie they ended up believing it so strongly that they eventually started to live that lie. In this way, Hamlet is a young man who has suffered a series of unfortunate circumstances that could have propagated a descent into madness. Initially his attempt to feign madness could be considered as a method by which he can camouflage his inability to find an emotional catalyst to thrust him into a frenzied state of revenge: his response to the ghost’s revelation is relatively passive considering the repercussions it will have within the court. Thus, it would seem that perhaps his feigning of madness actually manifests itself in reality, as Hamlet struggles to distinguish between all the lies he is forced to tell and enters the spiralling mendacity within the court. In contrast to Hamlet, Ophelia subsequently develops a certainly genuine sanity due to the death of her father. Throughout the play, Ophelia is manipulated by Shakespeare, as a symbol of innocence because she is not part of the scheming, manipulative court; thus, her madness illustrates the effect on the innocent by those manipulating power. Ophelia herself says, â€Å"I was the more deceived,† talking with Hamlet of their love. Her madness may also be, to some degree, a product of her seemingly unrequited love for Hamlet. In Act 3 Scene 1, the parted lovers each illustrate their frustrations with the world and their argument may be responsible for sending both further into madness. Ophelia says, â€Å"O, what a noble mind is here o’erthrown,† which alludes to Hamlet’s emotional unbalance that has been poignantly reflected via Shakespeare’s change from his regular verse for Hamlet’s preceding tirade. This could be demonstrative of a whirlwind within Hamlet’s mind that causes him to abandon all rhyme and reason both mentally and in his expression of his thoughts. His rudeness and the confused emotions, which he presents before Ophelia may also lead to her later insanity and therefore, Hamlet may feel some guilt that further enhances his own mental instability. Hamlet’s claim in Act 3 Scene 4 to his mother, â€Å"That I essentially am not in madness, But mad in Craft,† would suggest that Hamlet still retains his purpose and motivation and has not started to live his lie. However, it could also be the ramblings of a lost and confused man, caught up in a spiral of emotions. The use of the word â€Å"craft† implies Hamlet’s cunningness in his approach to revenge. He appears to think he has manipulated himself so that he retains the upper hand: this can be reinforced by Shakespeare’s use of a play within a play in Act 3 Scene 2. The concept of a play within a play reinforces the idea of pretence and seeming. Hamlet’s directions to the players serve to illustrate the subtle balance acting and being. Hamlet feels that the â€Å"purpose of playing† is â€Å"to hold as ’twere the mirror up to nature: to show virtue her feature. † Therefore, acting in Hamlet’s eyes would be replicating emotions exactly, as though they were real. This is where Shakespeare manipulates the audience because Hamlet’s definition of successful playing may, also, therefore, be reflected in his pretence of madness. In order to feign madness, he must reflect nature exactly and it is here where the distinction becomes blurred because Hamlet himself is treading a fine line, as he attempts to sustain a pretence and thus, it becomes increasingly difficult to determine whether or not he is in fact still pretending as the play progresses. Shakespeare’s choice to make Hamlet conduct his own play is clearly an attempt to demonstrate Hamlet’s manipulative abilities and to a certain degree to still suggests that he has retained his sanity because it allows him to gauge the response of King Claudius before engaging in revenge. Therefore, this would suggest that Hamlet is a sly and slightly devious character, perhaps as much so as the rest of the court: however, fundamentally, it might indicate that he is acting logically and methodically via the theatre as his chosen medium. This innate subtly of his manipulation would suggest there is a certain â€Å"craft† to his revenge that is carefully calculated and thus, it is only his method which may seem extreme and it is not a reflection of his sanity. A defining scene that stimulates much scholarly dispute is Act 3 Scene 4, where the ghost reappears to Hamlet in the presence of his mother. The source of the dispute lies in whether on this occasion the ghost is real or simply a figment of Hamlet’s imagination because it is evident that Gertrude cannot see the ghost, â€Å"This is the very coinage of your brain. This bodiless creation ecstasy Is very cunning in. † Shakespeare could here be using Gertrude as a mouth piece, to lead the audience into believing Hamlet is now no longer feigning his madness. However, an important contrast with Ophelia’s madness is that she rambles and appears to have no rhyme or reason in the words she utters, whereas Hamlet maintains purpose and retains his factors of motivation, such as his resentment towards his mother and women in general. This scene is poignant in leading the audience towards their interpretation of Hamlet’s mental disposition and it is important to recognise that this can also be manipulated by the actors themselves and the way they perform this scene. It is a very emotionally charged scene and the use of dramatics and theatrical stage devices will have a certain influence on how Hamlet’s madness is perceived. In conclusion, Hamlet is an unbalanced individual thrown into a state of turmoil, as he has had his fears confirmed by the appearance of his father’s ghost. However, it would seem that Shakespeare, perhaps intentionally, has left a large degree of the interpretation of Hamlet’s â€Å"antic disposition† to the audience and to the artistic licence of the actors. Whilst this may not have been Shakespeare’s intention, as he is renowned for his perfectionism and influence on the performances of his plays, it has created a play that is still subject to much literary discussion and intense analysis, in order to settle one of literature’s greatest disputes: one that is likely never to be settled. However, by studying the text it seems that Hamlet is feigning his madness throughout the play but his exuberance and authenticity progresses along with the play. It is an insight in a mind filled with a whirlwind of emotions and Hamlet’s use of a play would appear to simply reflect his preference to use words rather than actions, as can be seen my many of the play on words he uses in his speech. Hamlet himself says that acting must be an accurate reflection of nature and therefore, Ophelia’s insanity may have provided inspiration, rather than sending him even further into his own madness. The most influential aspect of the play that has lead to this personal response is the contrast between Hamlet and Ophelia’s madness. Throughout the play he maintains a high level of thought and emotional complexity and responds to all the actions of those around him, which would suggest that he is not in a world of his own created by insanity. Instead he is continually able to refute allegations of insanity when he wants be listened and adhered to, â€Å"My pulse as yours doth temperately keep time, And makes as healthful music. It is not madness That I have utter’d. † Thus, it is difficult to reach a resounding decision on his â€Å"antic disposition† due to Shakespeare’s accurate portrayal of a complex web of emotions; however, ultimately, it would seem he desired to reflect the potential for confusion of emotions whilst maintaining the coherency of his tragic hero. Bibliography â€Å"Hamlet† by Shakespeare, edited by Roma Gill, M. A. Cantab. , B. Litt. Oxon. Published by Oxford University Press, 2002. Aniela Baseley 13Fo English Coursework 2005/6.

Tuesday, July 30, 2019

Individual Reflection : Handling Difficult Conversation

This paper is my individual reflection on how to handle difficult conversations. We are faced with difficulty to transfer the message we want the other to understand and comply or support. Because of this complexity of communication barrier we end up in a conflict or a confrontation. When this happens we let go of the problem – forget it , avoid it, avoid being involved or ignore it. Learning two way conversation and certain strategies to handle a difficult conversation, is a step to better yourself in the way you voice out without any personal intent.In our everyday lives whether professional or personal we always encounter a difficult conversation – conflict on one and confrontation on the other. Most in some cases goes for the best of intentions for the benefit or interest of the person or the company. But what makes it a difficult conversation is how you relay the message on board, how one decides to handle it, how you understand it, how your message is being unders tood by the other and whether to comply or give support.My individual reflection for this is an incident that has occurred between two directors of the company whom are also the proprietors of the company – my mother and I. As much as my mother and I are the sole owners of the company, my late father left behind, I would like to use it in relation to this topic of difficult conversations in a professional setting. My mother and I have different ways of doing things and have different ideals when it comes to running a business. She is my superior as the Managing director of the company.She is old fashioned in her approach to things and also does not read or write and I am kind of what I’ll like to describe as transforming. There was a situation that occurred when some of our clients were complaining about the quality of the TV sets in their rooms and how they didn’t like the idea of them having to pay that much money for a night in the hotel and have to watch a b oxed TV instead of the new flat screen TV that were in vogue. I decided to have a meeting with my mother on this matter to explain the importance of upping our standards in terms of quality.My mum found this statement from me demeaning and queried me that it’s not in my place to talk to her about such matters. I on hearing those exact words flamed up and attacked saying I had as much rights and power as her when it meant running of the company and as such my opinions as well as decisions matters whenever I decide to put them forth. Next thing I noticed was that our conversation became so heated and filled with argument that we weren't even talking about the success of the business anymore but moved from away from its professional discussion to that of a personal confrontation.I decided to stop talking about this because I noticed my mother wasn't being receptive to anything I was saying at that moment, so I let the topic drop for that moment but went on to contact my aunt and explained to her my views on the issue and how difficult it was for my mother to see my view on the issue. This turned out to be a good idea as my aunt was able to relay my opinion concerning the company and its improvements and she helped to straightening out a lot of things also.Using my aunt as an intermediary between my mother and I was effective as it was able to quell the discord we were having as well as relay my opinions on the pressing issue at hand at that moment in time. But as time goes by I sat and thought over things that I cannot be using my aunt as an intermediary all the time my mother and I are having an argument. I had to think of a more approachable way to rely my messages across to my mother without creating any misunderstanding. I realized that I needed to deliver the message towards thinking of it as a two-way learning conversation.  (Christensen, 2011).When I thought over our argument I realized I involved too much emotions and forgot about the companyâ₠¬â„¢s interest. In that I noticed how money, as well as emotions are factors that lead to difficult conversations as Christensen. K (2011). Moreover I also didn’t take into consideration the age difference, refinement of etiquette, difference of seeing things and also literateness.I sat with my mother on a normal day and asked her â€Å"Mom, how did you understand when I told you we had to upgrade the quality of services we offer in the hotel?†, she said â€Å"Mariah, I am not stupid you know, I do not know how to read and write and that is not my fault because my parents couldn’t send me to school but I give you the opportunity and you benefitted to where you are today, and when you want to say something, talk to me in a manner you don’t have to be sarcastic. † It took me a while to understand what she meant by me being sarcastic. I wondered whether my being straightforward telling her the truth was unacceptable or was it the way I said it.As acco rding to Amy & Diana I realized I had a personal motive conflict between my mother and I when there are better ways to voice it out calmly without involving any personal interest or have any personal intention whatsoever Moreover I remembered what my father told me once that in business don’t argue to win or to imply who is right or wrong. A problem or an unpleasant event has happened instead of sitting there and complaining and arguing what should and should not be done, take the professional actions to solve the problem if it benefits the company and everybody at the end. No loss occurred and incurred.Well, if I had listened to my father I do not think I would end up having an argument with my mother and wasting time to solve the problem. Nevertheless, from this course I have learned from Amy & Diana to practice self – management â€Å"the ability to examine and transform the thoughts and feelings that hijack one’s ability to reason cally when conflicts heat up†, reflecting on spontaneous reactions – â€Å"once a conflict triggers an emotional reaction, reflecting can cool one’s own emotion down by turning the automatic â€Å"go† response into a more deliberate â€Å"know† response†, reframing and manage conversations.Moreoevr according to Engels, he stated that when you deliver difficult messages you should avoid ordering/directing, warning/threatening, preaching/moralizing, advising/giving solutions, evaluating/blaming and interpreting/diagnosing. In which I realized I was having a rather ordering tone with my mother. Being that I am able to admit where I am having a problem with delivering my messages, from what I have learned I would be well prepared to most especially listen before I react and plan for a better conversation and find a more comfortable way in relaying my messages across.

Personal Life and William Hazlitt

Many people say will say that â€Å"money cannot buy happiness. † Nineteenth-century author, William Hazlitt, wrote â€Å"On The Want of Money† to put forward his belief that a life without money is a life full of misery. Hazlitt uses negative diction, parallelism, and specific syntax to show that a person could not lead a happy life without money. In his writing, Hazlitt uses negative diction to discuss the importance of money in one’s life.. Hazlitt uses words like â€Å"crabbed† â€Å"morose† and â€Å"querulous† to show the discontent one would feel without money.With his gloomy word choice, Hazlitt establishes a negative tone and gives his audience a clear idea of what a miserable life one would have without money. Doing this, he suggests the idea that the poor have no control of their lives because they don’t have the money to change the way their miserable lives. Equally important, Hazlitt uses parallelism to stress the importan ce of money in a happy life and show the dreadful instances a person in poverty can go through.He states that living without money, â€Å"it is to live out of the world, or to be despised if you come into it†¦it is to be scrutinized by strangers, and neglected by friends†¦Ã¢â‚¬  By doing this, Hazlitt explains how a person without money cannot possibly be happy, because he or she will be disliked by everyone around them. The dark mood set by all of the examples Hazlitt gives portrays what Hazlitt thinks a life without money would be: difficult, lonely and overall unhappyFurthermore, Hazlitt uses specific syntax to prove his point that one without money cannot possibly be happy. He uses one long sentence that stretches from lines 2 to 47 to put an emphasis on the fact that people without money lead a life filled with misery. Hazlitt’s use of the lengthy sentence represent all of the never-ending obstacles one without money faces. Hazlitt’s purpose in doing t his is to accent his idea that a person without money does not lead a happy life.By using one long sentence instead of many shorter ones, Hazlitt makes the reader feel hopeless and as if they were drowning in their distress Overall, Hazlitt uses negative diction, parallelism and syntax to show his belief that money is what gives you happiness in life. By stating so many examples and employing his strategies, Hazlitt makes reader feel deprived of their hope of being happy in this world without money, which is exactly what the author’s purpose was. To be without money is to be â€Å"†¦dissatisfied with every one, but most so with yourself.. †

Monday, July 29, 2019

Research Paper Challenge and Change in Society Essay

Research Paper Challenge and Change in Society - Essay Example In the period of 1946-1950 UNICEF spent $112 million to provide "articles of clothing to five million children in twelve countries, vaccinated eight million against tuberculosis, rebuilt milk processing and distribution facilities, and [. . .] provided a daily supplementary meal to millions of children" (Haberman, 1972). Though the initial mandate of the program was for immediate and emergency aid, the organization has expanded to provide a wide range of diverse and long-term projects. The purpose of the United Nation's mandate is stated in UNICEF's mission statement which says it is to, "advocate for the protection of children's rights, to help meet their basic needs and to expand their opportunities to reach their full potential" (About UNICEF: Who we are, n.d.). UNICEF has moved beyond emergency relief and into the areas of pro-active medical and educational needs. Its long-term and rapid response efforts are designed to help disadvantaged children that are the victims of poverty, violence, exploitation, and war. Many of their programs are gender specific as they fight for equal rights for girls and women. One of the goals of UNICEF is to promote girls' "full participation in the political, social, and economic development of their communities (About UNICEF: Who we are, n.d.). The numerous programs implemented by UNICEF have at their core the goal of improving the lives of children everywhere in the world. The motivation behind UNICEF lies in their belief in the principle that all children have civil and human rights that need protected. The Convention on the Human Rights of Children (CRC) is a widely ratified treaty that provides the protection of "civil rights and freedoms, family environment, basic health and welfare, education, leisure and cultural activitiesand special protection measures" (Why we do it: Children have rights, n.d.). UNICEF is driven by a philosophy that children not only deserve the basic protection of human rights, but the best way to change the world is to improve the condition of the children which will be tomorrow's adults. In their efforts to raise the standard of living for children UNICEF has programs that are implemented in 190 countries including most of the industrialized world. As an example of their international efforts is the recently launched program to prevent mother-to-child transmission of HIV (PMTCT) in eight countries in Western and Southern Africa and India (UNICEF, UNITAID, 2007). The PMTCT initiative works in partnership with UNITAID, a World Health Organization (WHO) effort whose mission is to provide "long-term, sustainable and predictable funding to increase access and reduce prices of quality drugs and diagnostics for the treatment of HIV/AIDS, malaria and tuberculosis in developing countries" (What is UNITAID, 2007). In the United States the United State's Fund for UNICEF has raised over $1.6 billion to "promote the survival, protection, and development of all children worldwide through fundraising, advocacy, and education (United States Fund for UNICEF, 2008). Because the United States is a leading voice in the United Nations UNICEF has looked to the American citizens for support and advocacy. The activities of UNICEF in the United States have not been without controversy. During the Cold War standoff between

Sunday, July 28, 2019

Irresponsibility in High Fidelity by Nick Hornby Essay

Irresponsibility in High Fidelity by Nick Hornby - Essay Example The paper tells about Rob’s irresponsibility that emerges through his lack of commitment, self-destructive attitude and lack of initiative. At the beginning of the novel, the narrator lists his five prior breakups. This breakup portrays the narrator’s inability to sustain a relationship. He seems to be looking for something more that he cannot understand. The first breakup is with Alison Ashworth whom he dated for a few hours. Robs then dated Alison Hardwick, a year after his first breakup. Hardwick could not give into his sexual demands leading to a breakup. Rob, still eager for a relationship, steals his friend’s girlfriend who was called Jackie Allen. This relationship lasted only a few weeks after which Allen left him for his prior boyfriend, Phil. His fourth relationship ends in a breakup as well. The girl in the fourth relationship is Charlie Nicholson whom he met in college. Rob kept thinking that she was too good for him and that she would eventually leav e him for another person. They eventually break up. Rob still earns for relationship and meets Sarah Kendrew, who like Rob, hurts from a breakup. Rob and Kendrew swear to live together forever but Kendrew meets another person and leaves Rob. This string of breakup portrays Rob’s inability to commit fully in a relationship. Numerous breakups may motivate one to get into a mature sustainable relationship. However, Rob wants to be free so that he can act as he pleases. He also wants to enjoy an intimate relationship with a woman. This is irresponsible because he should take some time to assess his feeling and decide on the best course of action. Instead, he is contented by the initial infatuation and intimacy with a woman. After staying with a woman for a while, he starts questioning himself whether the woman is right for him. Rob usually finds reasons to leave her than stay in the relationship. This also happens with Laura, his next girlfriend (Knowles 14). The author uses the numerous girlfriends who broke up with Rob as a symbol to indicate his lack of commitment. His love for music symbolizes his loneliness and need for fulfillment. It is ironic that the author calls the novel high fidelity to highlight commitment to a marital relationship though Rob is committed to himself. Rob’s inability to commit does not apply to relationship but also other aspects in his life. For example, he dropped out of school due to the inability to commit to schooling requirements. He has a music shop that does not reward him significantly though the business does not bother him. He is comfortable with his meager earnings so long as he can afford a meal and shelter. His actions are attributable to lack of commitment to his responsibilities, as well as, woman named Laura. In the event that he was responsible, he would have worked harder to improve his life. Laura eventually prompts him to think of other things that he may enjoy doing in a bid to generate money. A read er is likely to label Rob’s actions are irresponsible. The Commitments by Roddy Doyle depicts the power of commitment. Derek Scully and Foster commit themselves to forming a band though they know little about music. Regardless of their inexperience, they continue pursuing their dream. They sign in more members and struggle to make their dream come true. On the contrary, Rob does not seem to put work hard at

Saturday, July 27, 2019

Have infant and toddler educational videos impacted quality parental Research Paper

Have infant and toddler educational videos impacted quality parental interaction - Research Paper Example As a result, television becomes not only their favorite pastime, but a tool for learning. With the impact of television among the children aged 2, which almost takes over the lives of these children, their development, the biggest concern is their involvement with their parents, which weakens due to time they spend watching TV (Courage & Setliff, 2009). Videos and television have become the contemporary educators, which, some analysts argue, have taken over the role of parents for these children. This essay shall undertake an analytical research to assess the declining ability of the parents to act as the educators and trainers of their children and how most of them have been reduced to mere ‘watchmen’. The essay shall incorporate the works of numerous analysts and researchers in the quest to assess the validity and application of the title of the work in today’s society. In the research compiled by Garrison and Christakis (2005), many toddlers are addicted to videos in one way or another, especially the ones that teach them new songs, how to read, and how to play various forms of music. Most of the parents also do not have time to play with their children and teach them new games, an aspect that reduces the toddler to learning new games from the frequent programs, and videos aired on television and films related to play for the toddlers. An encouragement of the parents to allocate time for their children especially for play means that the kind of interaction present in the two parties is actually doubtful. To clarify the intensity of the problem facing the toddlers who need ‘touch’ from their parents, videos have been produced that relate to the toddlers. These videos consist of colors, games, words and letters that provide the basis for introduction to toddler education. Though some analysts are of the opinion that

Friday, July 26, 2019

Packing in school Research Paper Example | Topics and Well Written Essays - 750 words

Packing in school - Research Paper Example The federal government have also implemented reductions in salt and saturated fat, trans fats in addition to the proper portion of lunches for children according to their age. The standards were based on the Dietary Guidelines for Americans and developed by the U.S. Departments of Agriculture and Health and Human Services (Mientka, 2013). In 2011, to encourage healthful eating, Chicago schools implemented the media approbation for a long- standing policy that banned homemade lunches. They were allowed only for those children who had any doctor’s notes. The policy was initiated on the basis of observations that stated that students were bringing bottles of soda and bags of hot chips for lunches. A peanut butter has also been banned by schools. However, that aroused mass protests among parents, when schools started bringing in  rules banning nut- free spreads. Schools were defending their decisions by stating that nut- free products looked much like real peanut butter and that stressed out those children with allergies (Eng & Hood, 2011). Critics, however, assume that schools along with the federal government thought of everything, but for the children good. Asserting in schools of such lunch programs was called by the desire to enrich the pockets of corporations. Besides, people stated that that was the perfect demonstration of how the governments one-size-fits-all requirement on nutrition works. However, it failed again, because some parents desired to pack a gluten- free meal for a child and others had no problem with their child to enjoy soda. Lunch policies, whether they are dictated by the desire to form better understanding of how should a child eat every day or they are simply at school’s hand, they do not have to dictate parents how to pack in their kids’ lunches and what to put inside the lunch bag.  Banning of certain products or lunch meals as they are put teaches and government in

Thursday, July 25, 2019

Privacy-Enhancing Security Mechanisms Research Proposal

Privacy-Enhancing Security Mechanisms - Research Proposal Example There also exist some privacy-preserving protocols that are being widely used in different technologies, such as, wireless sensor networks, mobile computing, and data mining operations. In this paper, we will discuss the technique to design a reliable and efficient privacy-preserving scheme in order to ensure increased security of data over the network. Problem Statement The problem statement for the research paper is: "Design and analysis of privacy-preserving network and cryptographic protocols" Conceptual Framework Aim of the Research In realistic networked environments, data security is the main focus of the management. Although there are several protocols and security mechanisms available for the protection of sensitive information, yet the security of the networked environments cannot be fully guaranteed. Generation of a reliable secret key can play a considerable role in this regard which should encrypt and decrypt the data while ensuring data integrity and authentication. The re is a need to design and implement privacy-enhanced cryptographic protocols using private handshaking, which should be able to provide optimum security to the sensitive information being transferred using mobile and messaging services. We will focus on designing a new pair wise key management scheme, which will include the properties of digital signatures and blindness along with the use of private handshakes. The key management scheme will make use of Boneh and Shacham's group signature scheme to ensure privacy and security in wireless networks. Literature Review Das and Giri state that pair wise key establishment enables sensor nodes to communicate securely in a sensor network with other nodes with the use of cryptographic techniques. Bista and Chang state, â€Å"Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor data during transmission from the source nodes to the sink node†. Privacy is integral for wireless networks and ins tant messaging. Patil and Kobsa state, â€Å"Inadequate support for managing privacy could lead to suboptimal use of IM and thereby undermine its benefits†. Privacy-preserving network protocols play an important role in ensuring securing of data being transferred over the network. Privacy-preserving authentications achieve traditional goals as well as privacy of the authenticator and the verifier (Xu and Yung). Two of the main Privacy-Preserving Network Protocols include TOR and Off-the-record messaging. Off-the-record messaging techniques will be used because it enables private conversations over the wireless networks using the concept of encryption, authentication, deniability, and perfect forward secrecy. Cryptographic protocols will also be an important part of the research because they use such algorithms which ensure security of information over the network. â€Å"For the past three decades, a wide variety of cryptographic protocols have been proposed to solve secure c ommunication problems† (Shin). â€Å"Modern cryptography is concerned with the construction of systems that are robust against malicious attempts† (Goldreich). Cryptographic protocoal serve good when used in combinations, such as, ? 1, some ? 2s. â€Å"Although cryptographic protocols are typically analyzed in isolation, they are used in combinations† (Guttman). Lindell and Pinkas state, â€Å"Cryptographers seek to make secure protocols as efficient as possible in order to minimize the performance gap between secure and naive

Wednesday, July 24, 2019

Rousseau's Social Contract and John Stuart Mill's On Liberty Research Paper

Rousseau's Social Contract and John Stuart Mill's On Liberty - Research Paper Example The two philosophers have also delved into the relationship that exists between the government and liberty, while also investigating the valid basis for limiting liberty. Mill’s position on the concept of liberty is based on the observation that the majority in the society has the opportunity to dominate the minority, and thus subject them under their own authority (Mill, 12). As a result of this observation, Mills advocates for individuality, where individuals possess their own rights that are not interfered by the society and thus can be able to shape their own destiny without depending on the influence of the society, which is highly driven by the tyranny of the majority. On his part, Jean–Jacques Rousseau observes that man was born in freedom, to be absolutely free, but he is always in chain whenever he is (Rousseau,). In an attempt to devise the right ways of developing a political community, he devised the fundamental concept of the liberty of people. Pitched on t he argument that only the people can develop the rules that should govern them, and anything short of that is unacceptable. Therefore, this discussion seeks to compare Rousseau's Social Contract and John Stuart Mill's On Liberty, with a view to assessing their points of congruence and departure, in regards to the concept of liberty and the freedom of man. ... Therefore, it is the institutions like that of private ownership of property that has made man bad (r). This is because, with the introduction of such institutions, man has been corrupted and made mean, so that he attempts to own as much as he can, without any due regard for the others. If there were no private ownership of property, a man could not be such corrupt or mean, because he could only use what is enough for him, and leave the rest for others, thus creating equality for all. Therefore, the existence of institutions has destroyed man’s pity and benevolence. Thus the fundamental basis for Rousseau’s belief in liberty is equality and security, where the man can obey himself, while still uniting himself with all, and retaining the ever unlimited freedom (Rousseau, 33). According to him, only institutions create inequality and insecurity. Mills, on the other hand, observes the fundamental basis for liberty as individuality and individual basic rights, which he obse rves are the basis for the good citizenship, which translates to a healthy society, and consequently to the freedom of mankind (Mill, 24). He observes that individuals should have the freedom from constraint by the government, but that is associated with self-rule. Therefore, Mills differs with Rousseau regarding the fundamental basis of freedom, by arguing that individual rights grant man freedom, and by extension makes the society free. On his part, Rousseau argues that individual rights make an individual a slave of oneself, by making him obey his self-desire (Rousseau, 56).  

Questions Essay Example | Topics and Well Written Essays - 500 words - 9

Questions - Essay Example According to Goldman, the qualitative approaches to assessment needs is more clients involves and is based a lot more on the standardised or objective tests. a) Quantitative Approaches of Assessments: This form of assessment includes self – efficacy measurements. Here the individual’s judgement to judge the ability to perform a task at a level. â€Å"These self – efficacy cognitions mediate action with the result that individuals avoid tasks or activities they believe are beyond their capabilities and instead engage in those they judge themselves capable of performing†. b) Qualitative Approaches of Assessments: These assessments are based on two major philosophical positions, post modern and logical positivism. The major practical differences between each of the perspectives are mainly in the assessment area. The logical positivists have relied a lot on the traditional measurement devices. These include interest and personality inventories while the postmodern theories do not include the above mentioned factors. a) Quantitative Approaches of Assessments: These assessments include Scholastic Aptitude Tests and other similar tests that are progressed to through school. This is a relatively common and most common to all the readers. b) Qualitative Approaches of Assessments: These assessments include techniques like repertory grid, reptest. These are relatively very complex and require extensive training before they can be used in career counselling. The post modern assessments are easy to use and a few of the strategies and tests used here include Career – O – Gram, role play, card sorts, and genograms. Special needs are a term that is used to refer to clinical diagnostic and functional development to describe individuals who need assistance for disabilities that may include mental, psychological and medical assistance. Disability has been defined by WHO as, â€Å".. is any restriction or lack

Tuesday, July 23, 2019

1.how has unemployment affected the economy over the last four yeasr Research Paper

1.how has unemployment affected the economy over the last four yeasr. 2.Have unemployment rate increased or decreased over the last four years - Research Paper Example It has had negative effects on the economy because the government financial budget has had strains in trying to meet the needs of all citizens to their satisfactory but still can not because a high population is unable to cater for its daily needs. The problem still stands to be the issue of unemployment. The economy is unstable because people are over dependent in government expenditure rather than generating income for the economy (Markus 206). The rate of unemployment has increased from around 5% in the year 2007 to around 10% in the year 2011. This shows that the economy is rising with time and the government has failed in its efforts to draft measures that can counter these changes thus making the citizens to be on the receiving end to the harsh economic changes. Apparently, unemployment still remains to be a matter to be looked into as people are suffering without knowing the way forward to a solution. The government should increase the number industries so create job opportunities and control the rate of

Monday, July 22, 2019

The Presentation of Self Essay Example for Free

The Presentation of Self Essay Erving Goffman’s idea about the â€Å"presentation of self† reflects the observational character of humans that tend to try to please other people. In this way, human’s everyday interaction is said to being â€Å"dramatized† that is, humans are more likely to express themselves in a manner that is personally designed to capture an impression from other people. This impression can vary from person to person, one person might try to act demure, another old, another wise, depending on the personal preference of the individual. All in all, Goffman’s idea tries to open the possibility that people creates the image of themselves that they want other people to recognize. This is done through meticulously picking up clothes, cutting and trimming the hair, putting make up and other accessories in able to enhance the physical feature of the person. This also implies that physical presentation of a person greatly affects how the person is perceived or judge by others. In the case of a professor teaching in class, he portrays himself as much authoritative as he could possible get. This is one way in order for him to get some respect. He needs to portray an individual who could answer most of the questions in a class; this would make him look knowledgeable and more authoritative. The way he carries his clothes, wears his shoe and styles his hair would also reflect his personality and his position in class. If a professor is not neatly dressed, students would lose respect and would treat him with less importance. Thus, it is important that his appearance along with the way he carries himself and speak his ideas, all reflect decency and proper authority. Human emotions are rooted in biology in cases wherein people felt pain and express themselves. For instance, people when hungry are mostly irritated, sad and sometimes anxious. On the other hand, emotions can be guided by culture in cases of disgust, shame, appreciation of objects and other things that are dependent mainly on the person’s culture. With respect to Goffman, those that are culturally determined emotions are those which are generated through other people’s perspective or those that are culturally determined, while biological emotions are those which is experience by the person himself.

Sunday, July 21, 2019

Effectiveness Of Information Technology On Supply Chain Management

Effectiveness Of Information Technology On Supply Chain Management Supply Chain Management is the concept known as the management of the materials and the information across all the partners within an industry including customers customers and suppliers suppliers. Supply Chain Management introduces the initiatives for competitive advantages to companies and it reinforces the use of technology for more accurate and faster communication among supply chain partners. The field of supply chain management has become tremendously important to companies in an increasingly competitive global marketplace. The term supply chain refers to the entire network of companies that work together to design, produce, deliver, and service products ( Hausman, 2001) Generally speaking, the supply chain is the sequence of enterprises from suppliers to end customers. The National Research Council refers to it is an à ¢Ã¢â€š ¬Ã‚ ¦..association of customers and suppliers who, working together yet in their own best interest, buy, convert, distribute and sell goods and services among themselves resulting in the creation of a specific end product ( National Resource Council, 2000) According to the Mentzer Supply chain management is defined as the systemic, strategic coordination of the traditional business functions within a particular company and across businesses within the supply chain, for the purposes of improving the long-term performance of the individual companies and the supply chain as a whole. (Mentzer et al.,2001 in www.emeraldinsight.com) Companies cannot work for themselves and are hence automatically part of at least one supply chain. The key participants are the manufacturers and their respective suppliers that collaborate to create and support the end-product as well as the customers that purchase the latter. A typical supply chain comprises the following layers.( Werner, 2002) Primary producer Multiple tiers suppliers Ones own company Intermediary trade in the form of wholesale and retail End-users A supply chain is the process of moving goods from the customer order through the raw materials stage, supply, production, and distribution of products to the customer. All organisation have supply chains of varying degrees, depending upon the size of the organisation and the type of product manufactured. These networks obtain supplies and components, change these materials into finished products and then distribute them to the customer. Managing the chain of events in this process is what is known as supply chain management. ( Ligus, 1999) The bullwhip effect is a major cause of supply chains problems. It describes how small fluctuations in demand at the customer level are amplified as orders pass up the supply chain through distributors, manufacturer, and suppliers. As an example consider disposable diapers. Babies generally consume diapers at a more or less consistent rate when aggregated over a large group of customers. Nevertheless, order fluctuations invariably become considerably larger as one moves upstream in this supply chain. Consequences of the bullwhip effect can be severe, including excess and fluctuating inventories, shortages and stock outs, longer lead times, higher transportation and manufacturing costs, and mistrust between supply chain partners.(Fisher, 1997) The Supply Chain Operation Model (SCOR) was designed to enable companies to communicate, compare and learn from competitors both within and outside of their industry. It only measures supply chain performance but also effectiveness of supply chain reengineering. Further it has the ability to test and plan future process improvements. The SCOR is a process reference model. Process reference models integrate the well-known concepts of business process reengineering, benchmarking, and process measurement into a cross functional framework( SCC,2001) The evaluation of supply chain management information technology enables companies to integrate activities and organisations that were previously separate. Inside a larger organisation the key element for forging new efficient processes is sharing data between functions in real time. The objective is to eliminate administrative tasks that were develop when information could only be shared by sending documents between these areas. ( Eloranta, E Holmstrom, J et al., 2001) Information technologies are no longer considered as nice to have instead it is believed that is a must. Whoever uses the information technologies effectively in managing his business will have more chance to succeed in todays world. Capturing the necessary data is one part of the race but filtering and changing the data into information effectively is the most important concept. Companies produce vast amounts of data everyday but they require advance tools to manipulate the data to reach the informative data which helps to manage their business. The purpose of this research is to introduce the supply chain management concept and initiatives; and point the information technologies used in this area to achieve the expected benefits from the management of a supply chain. It emphasis how information technologies effect supply chain management and how can it be used to manage the supply chain more effectively. In this piece of work, the basics of Supply chain management and the initiatives of the supply chain management are being described. The effects of information technologies, as the inevitable backbone of the supply chain management, will be explained in detail. 3. Rationale for Chosen Topic: Companies strive to improve market share, grow corporate profit, and gain strategic advantage. In order to achieve these goals, supply chain competency must be placed at the heart of a companys business model. Firms realize that the competition is driven by customer demand. Effective supply chain management can offer customers high quality products and services with low prices. Effective SCM can help lower production and distribution costs through seamless cooperation between business partners in their supply chain. The big retail chains have fought to a standstill in price wars over the last decade. Now they are realising that the lending edge IT is an invaluable weapon in the battle for market share ( Masters) 4. Research Questions: Formulating a series of questions adds clarity to the research process. Therefore, the fundamental questions for the proposed research topic are: What are the benefits of IT on management of supply chain? What are the effects of IT system on supply chain management? What are the benefits of vendor managed inventory in supply chain management? 5. Research Objectives: The research objectives explain the purpose of the research and define standards for what the researcher is going to do. The objectives specify the information needed to accomplish the research process. The aim of this research is to gain a better understanding of supply chain management and how affect IT on management of Supply Chain by analyzing the vendor managed inventory (VMI). This VMI concept will be introduced and its benefits to supply chain management 6. Literature Review: Information is crucial to supply chain performance because it provides the foundation on which supply chain processes execute transactions and managers make decisions. Without information, a manager will not know what customer want, how much inventory in stock, and when more products should be produced and shipped. In short, without information a manager can only make a decision blindly. Therefore, information makes the supply chain visible to a manager. Given the role of information in a supply chains success, managers must understand how information is gathered and analysed. This is where IT comes into play. IT consists of the hardware and software throughout a supply chain that gathers, analyses, and acts on information. It serves as the eyes and ears of management in a supply chain, capturing and analysing the information necessary to make a good decision. Using IT systems to capture and analyse information can have a significant impact on a firms performance. For example, a major manufacturer of computer work-stations and serves found that much of the information on customer demand was not being used to set production schedules and inventory levels. The manufacturing group lacked this demand information, which forced them to make inventory and production decisions blindly. By installing a supply chain software system, the company was able to gather and analyse data to produce recommended stocking levels. Using the IT system enabled the company to cut its inventory in half because managers could now make decisions based on information rather than educated guesses. Large impacts like this underscore the importance of IT as a driver of supply chain performance. (Chopra, S. and Meindl, P., 2001) An efficient way to improve the effectiveness of SCM is to use Information Technology (IT). IT-solutions improve the integration with other actors in the supply chain and make the business processes more effective. This is done by reorganizing the processes and automating the information-flow between the businesses involved (Wu et al., 2004). Information technology has developed in a very fast pace in the area of supply chain management. This has generated new tools and solutions to handle the information sharing between different actors in supply networks. These types of supply chain technologies are of great current interest which is indicated by a research made by AMR Research Inc. The research indicates that nearly $15 billion been spent on SCM software since 1999 in the US alone (Ruppel, 2004). The most typical role of IT in SCM is reducing the friction in transaction between supply chains partners through cost-effective information flow. Conversely, IT is more importantly viewed to have a role in supporting the collaboration and coordination of supply chains through information sharing. Present IT as one of the key cures for bullwhip effect in supply chains. IT can be used for decision support. In this instance the analytical power of computers is used to provide assistance to managerial decisions. (www.emeraldinsight.com) Supply chain management is a vital part of the search for competitive advantage, today there is a wide range of software technologies that help to provide lean and efficient supply chains. All of which enable data, which might previously have been seen half way around the world by mail, to be delivered almost instantly with little cost or effort. (Johannson, M., 2003) A fast development of information technology has given the information flow within the supply chain a more central role than before. IT is a very important component within supply chain management and the development of IT has created many new opportunities for managing the supply chain. (Paulsson, U., Nilsson, C-H., Tryggestad, K., 2000) The internet is seen as the next big supply chain opportunity as it has gained increased reliability and security over recent years. As businesses have gained experience of this technology they are now able to take full advantage of sales automation through the internet. (Johannson, M., 2003) The supply chain absorbs as much as 60 to 80 percent of a sales dollar. Therefore it is of great importance to evaluate and analyze how the supply chain activities can be done more efficiently. This thesis focuses towards these types of activities, when a real-time IT-Logistics solution is implemented within the supply chain. This is done by many companies and the supply chain is becoming more and more essential to the firms competitive strategy. (Ballou, R. H., 2004) Information Technology (IT) is playing an increasingly critical role in the success or failure of the supply chain. IT ranks highly as the essential ingredient and backbone for the success of supply chain integration.(Barut, M., Faisst, W., and Kanet, J.J., 2002). IT has become one of the keys to operating success. It is impossible to achieve an effective supply chain without IT. Since suppliers are located all over the world, it is essential to integrate the activities both inside and outside of an organization. This requires an integrated information system (IS) for sharing information on various value-adding activities along the supply chain. (Gunasekaran, A. and Ngai, E.W.T., 2004) As customer demand steadily increases the importance of the application of information technology became clear, However success is not guaranteed by the technology itself, but by its application. (Eloranta, E Holmstrom, J., 2001) Over time, there have been numerous initiatives that have attempted to create efficiency and effectiveness through integration of supply chain activities and process. They have been identified by names such as quick response, electronic data interchange ( EDI), short cycle manufacturing, vendor-manage inventory (VMI), continuous-replenishment planning ( CRP), and efficient consumer response (ECR). (Coyle, J.J, Bardi, E.J., Langley, C.J., 2003) Electronic Data interchange ( EDI) allows companies to place instantaneous, paperless purchase orders with suppliers. EDI is not only efficient, but it also decreases the time needed to get products to customers as transaction can occur more quickly and accurately than when they are paper based. (Chopra, S. and Meindl, P., 2001) Prior to installing EDI many retail outlets would place orders for goods during stock out situations. For manufacturers this meant unpredictable peaks and falls in the order process, therefore making it difficult to establish a manufacturing cycle for their products. Retailers would stock up at the beginning of the season and face increasing stockholding costs plus the risk of having to mark down products at the end of the season to make way for new products. (Stafford, J., 1997) Continuous Replenishment Program (CRP) is an efficient replenishment concept within the Efficient Consumer Response (ECR) arena. It focuses on improving the flow of products in the supply chain, both forward to the customer and eventually the end customer, and backward to the supplier.(Ahlerup, T., 2001) Vendor manage inventory process can be defined as A mechanism where the supplier creates the purchase orders based on the demand information exchanged by the retailer/ customer To say this is a simple terms, VMI is a backward replenishment model where the supplier does the demand creation and demand fulfilment. In this model, instead of the customer managing his inventory and deciding how much to fulfil and when, the supplier does. The Vendor Managed Inventory (VMI) concept is one type of joint chain scheduling which takes care of the customers demand. This leads to increased flexibility for the supplier and efficient replenishment for the customer. (Vollmann, T. E., et al 2005) In order to make this work, it is necessary to have compatible systems that can support several standards of information flows from different actors. According to Vollmann this can be done through an open IT-architecture with a common platform for all actors within the network. VMI also helps by conveying customer demand data to the manufacturer, who can then plan production accordingly. This helps improve manufacturer forecasts and better match manufacturer production with customer demand. (Chopra, S. and Meindl, P., 2001) Vendor managed inventory (VMI) is a technique that allows suppliers to be empowered by managing inventories of agreed-upon items. VMI is now a widely practiced initiative in the retail industry. For example, Procter and Gamble (PG) and Wal-Mart have developed well-functioned VMI systems. A Web-based VMI system, in which the suppliers monitor inventory information via the Internet and replenish the items according to a predetermined contract, will improve customer service, reduce inventory buffers, reduce administrative costs, and reduce uncertainty for the supplier. The literature review identifies that IT is expected to have a pivotal role in managing supply chains, now and in the future. In fact it seems that the use of IT is crucial, especially in fast-moving industries, and particularly for managing contemporary supply networks. Moreover, the close relationship of the concept of SCM and IT sometimes makes it hard to assess which one contributes benefits. For example implementing a VMI model with EDI information transmission can lead to substantial reduction of inventories and at the same time increase material availability. 7. Research Methodology: The research design phase starts with the election of research methodology for the proposed study. The objectives of the study, the availability of information, cost of obtaining data, and appropriateness of the topic determines the research methodology used for the study. As the research is exploratory in nature, Qualitative research will be deemed more appropriate by choosing a case study, exploration of question of what the benefits of IT in SCM are. For the purpose of this investigation many different forms of primary research will be gathered by doing email and telephone interview. The goal is to understand the current state of IT implementations in SCM and what practical benefit they have recognised in SCM. Through the gathering of this primary research the information is mainly qualitative, this type of research does not involve numbers and figures or analysis of part performance but rather finding out peoples opinions and feelings, this type research also becomes increasingly important as a way of trying to predict further into the future. ( Dooley, D. Dransfield, et.al.1999) I will also use secondary data from the previous researcher, surveys and some contemporary issues. Secondary information will be used as a starting point for the further primary research, therefore it will be used in a majority of the research, this is due to the limitation of primary research and there is also a great deal of valuable information available through secondary research that the researcher fell need to be included, as it provides a good foundation for which to compare primary information and will therefore ensure validity. 8. Data Collection Methods: The data collection or gathering process is the stage in which the researcher collects data about the proposed topic. In this study, primary and secondary data collection method will be used to identify the nature of the problem. The articles from the business journals, the business books and other publicized material will be investigated to present the ideas of different academics on the issue of managing strategic change. Their findings on the issue will be included and research process and the comparison of opposite ideas will be based on the ideas of these academics. Athens Online Journals, University Libraries, Barnet Libraries, City Business Library , and British Library will be used to collect the required articles and books for the investigation. 9. Data Analysis: This is the stage where the researcher accomplishes several procedures to transform the data into useful information which helps answering the management problem and phenomenon. The proposed data analysis approach is qualitative data analysis method for this research. Data obtained through email surveys and telephone interview, various text books, journals and articles will be critically analysed by using a structured and systematic approach. The first aim here is to approach to the concept systematically and rigorously by doing so. The second aim is to establish a relationship between different ideas and structure them to reach to a conclusion. 10. Resource Requirements: The library facilities will be helpful to find sources such as published copies, course books, journals and samples. Internet is the most powerful source to gather information about companies, published copies, journals, samples, literature and secondary data. The other researches about the same subjects will be obtained through Internet websites and library.

The Meaning Of National Security Politics Essay

The Meaning Of National Security Politics Essay The development of the concept of security in the global scenario is being influenced by the changes in environment. This could be clearly seen in the changes of the nature of security during the world war and the post cold war era. In post cold war era, the emergence of new civil conflicts, large-scale atrocities and even genocide are in incremental rate. As globalization takes shape in the post cold war era, it is strongly believe that it will drag along significant increment in violent crimes, drug trades, transnational terrorism, diseases, environmental degradation and many other aspects of human life. These contemporary security concerns couples with the enduring problems of ethnic violence and inter-state conflicts are now at the forefront of potential and existing threats. 3.2 CONCEPTUAL MEANING OF SECURITY Security according to Barry Buzan is an under-developed concept (Hawkesworth and Kogan, Vol.2  [46]  ). Its status as a controversial political value and its habitual misuse as a rationale for state policies and actions, imply that the concept lacks of the intrinsic meaning. Buzan (1991) explains that one of the reasons behind the slow conceptual development of security can be attributed to the fact that the concept defies simple definition  [47]  . Another is that power dominates security in the realist school, which has been preeminent in international relations theory. Security has always been interpreted as the natural consequence of effective accumulation and exertion of power. Security is intrinsically a relational concept. In an objective sense, it measures the absence of threats to acquired values. In a subjective sense, security measures the absence of fear that such values will be attacked  [48]  . Lexical definitions of being secure refer to being safe against attack, impregnable, reliable à ¢Ã¢â€š ¬Ã‚ ¦, on the contrary, and to being untroubled by danger or apprehension on the other  [49]  . This definition points to the relational (subjective) nature of the concept of security. One should note that the objective physical condition favorable to ones secure existence has meaning only when set against the capabilities and intentions of possible adversaries. This also suggests that there can be no absolute definition of security. 3.3 THE MEANING OF NATIONAL SECURITY The broadening of the scope of security in the context of the nation-state is a controversial issue. As mentioned, there are scholars who were against the move to broaden the scope and meaning of national security for fear of destroying the analytical utility of the concept. Richard Ullman who initially supported the call to widen the scope of security eventually contradicted his initial proposition and is now engaged in a discourse with the proponents of a broader scope of security. According to Ullman (1995), If national security encompasses all serious and urgent threats to a nation state and its citizens, we will eventually find ourselves using a different term when we wish to make clear that our subject is the threats that might be posed by the military force of other states  [50]  . In the same article, he said that the war problem in security is conceptually distinct from other concerns like environmental degradation or urban violence, which are better categorized as threats to well-being. The problem of defining national security springs from the fact that the meaning of security itself is ambiguous. More importantly, if one uses the state as the referent, as the term national security suggests, he will then encounter the problem of who defines national interests or set the national security agenda of the state. Some scholars define security or national security as the protection and enhancement of values that the authoritative decision makers deem vital for the survival and well-being of the community  [51]  . However, this definition of security carries with it the problems that were discussed in the previous section. Although it is true that the regime aggregates the interests of the people, to define security or national security along this line or def ine security from perspective of the regime is unwarranted. If one agrees that the regime is both a source of threats and a producer of insecurity, then the concept must not be defined only from this perspective. The values that the authoritative decision makers seek to protect and enhance, which are deemed necessary for the well-being of the community, often do not constitute the national security or interests of the state. Hence, they are better labeled as the national security agenda. National security is a condition open to the assessment and evaluation of both the regime and the people. Whether or not the national security agenda represents the states national interests is another case in point. The definition of national security interest is relative to the one defining it. On the other hand, the national security agenda can be defined objectively and easily inferred from the national security policies of the government. National Security is better defined as the condition wherein the peoples way of life and institutions, their territorial integrity and sovereignty including their well-being are protected and enhanced  [52]  . This definition captures the essence of the state as composed of the people and the regime. It talks about two concerns, that of the peoples interest (well being) and that of the regime (sovereignty). 3.4 PILLARS OF NATIONAL SECURITY National Security rests on several pillars: social cohesion and solidarity, economic prosperity and stability, political unity and stability. Genuine security cannot be achieved if any of these pillars are absent  [53]  . The degree of security, which a country enjoys, depends ultimately on the strength of the pillars of national security. A country cannot be secure when one of its national security pillars is tenuous. These three pillars of security are interrelated and mutually reinforcing. Therefore, they must be built simultaneously. The responsibility of building these pillars rest on the people and the government/regime. The government leads the people while the people provide support to the government. By analogy, the government serves as the equipment or machinery for building the pillars while the people serve as the laborers, who use the equipment in building the foundations of national security. Social Cohesion and Stability Peaceful and harmonious co-existence among the people, regardless of social and cultural differences, is a foundation of national security  [54]  . This is achieved when people observe mutual respect for their values and beliefs. People must also offer cooperation and mutual support. Social cohesion allows consensus building necessary for effective decision-making. With social cohesion, the choices, decisions, and the consequent actions that government undertakes based on the concerns of the people become effective and persist despite challenges from the outside. Social cohesion embraces concepts such as moral spiritual consensus and cultural cohesiveness. Economic Prosperity and Stability Economic prosperity enhances the well being of the people. Without economic prosperity, the aspirations of the people to live a decent life cannot be attained. It is only when the country enjoys economic prosperity that people can live with dignity. It is a key element in augmenting national power, prestige, and influence. The development and sustenance of diplomatic and military power heavily depends on this. Economic prosperity embraces concepts such as ecological balance and sustainable development  [55]  . Political Unity and Stability Political unity means that there is cooperation among the different branches of government. It exists when those who exercise legitimate authority and political power act in concert toward the attainment common goals. When the political leadership is divided, the people are caught in a quandary as to which among those who exercise legitimate authority and political power should they support  [56]  . This puts the people in a dilemma where they have reservations and doubts on the policies and actions that the government undertakes. Public support is therefore essential to the governments success in meeting security challenges. The social, economic, and political aspects are permanent elements of national security foundations. The customs, traditions, laws, policies shall determine their respective status and quality, and strategies adopted by the government. The three pillars shall be created and shall operate within the context of the prevailing politico-legal organizing ideology of the state. It should be noted that no single pillar could guarantee security on its own. 3.5 THE DNYAMICS OF THE FOUNDATIONS OF NATIONAL SECURITY The pillars of national security are interrelated and mutually reinforcing. Social cohesion affects economic prosperity and stability. Social divisions and strife (e.g., sectoral or ethno-linguistic conflicts) could retard the nations economic development activities. For instance, policy disagreements between the government and the private sector could eventually affect the welfare of the people and the nations income. Economic prosperity or the level of development of the nations economy and the peoples sense of security has a positive correlation. Citizens of developed countries certainly feel more secure than those of underdeveloped countries. Economic development and prosperity are perhaps the ultimate objective a nation seeks to achieve. Economic development affects social cohesion  [57]  . When there is only a small pie available to be divided for the people, equal distribution will create a situation where each of the recipients get a small piece not sufficient for his nee ds. However, unequal distribution will leave others with little or no piece at all. Both situations leave the people dissatisfied. From Indonesias experience, economic instability can undermine the legitimacy of the regime. Barely ten months after the July 2, 1997 financial crisis hit Thailand, the regime of President Suharto was toppled. Although Indonesia is a relatively rich country in terms of natural resources and has achieved a relatively high economic growth prior the financial crisis, economic instability made the Suharto regime unpopular, which led to its demise  [58]  . Economic growth, once attained, does not automatically translate and ensure security. When the fruits of economic growth are not equitably distributed within domestic society, the threat of social unrest remains. Inequity or the rising inequality in the distribution of economic gains creates social divisions that could lead to violence and social anarchy. Political unity refers to a united leadership. Unity among the political leaders from the different branches of government facilitates fast and effective implementation of policies and programs, which are requisites of a secure nation. It allows government to take firm and decisive steps in addressing the different challenges that the nation faces. It also facilitates the quick delivery of services needed by the people. Each of the pillars of national security has to be stable and solid. Social cohesion, economic prosperity, and political unity if not stable and solid will not lead to genuine security. Thus, once these pillars have been built, they have to be maintained, protected, and enhanced. These are the basic responsibilities of a state. 3.6 BUILDING THE FOUNDATIONS OF NATIONAL SECURITY The different pillars of national security are not intrinsic to every nation. They have to be built. The responsibility of building the foundations of national security ultimately rests on the people as its ultimate beneficiary, and the duly constituted government, which shall exercise authority delegated to it by the people  [59]  . The regime shall lead the people towards the attainment of national security by formulating appropriate policies and strategies, and laws conducive to the enhancement and protection of national security interests. The people on the other hand, shall support the government in its security engagements. The government, through the different agencies and instrumentalities, has the responsibility of formulating appropriate policies, as well as strategies, which will pave way to the realization of the aspirations of the people. 3.7 DIPLOMACY AND MILITARY Security is a condition or state of affairs, which can be created or attained using the different political instruments such as diplomacy and military. In the literature, three conventional instruments of national power have been identified: economic, politico-diplomatic, and military instruments  [60]  . The economic instrument refers to the use of economic rewards and/or penalties to influence the policies of government leaders or states. This is done through Aid, Trade Preference Status, Trade Embargo, etc. The diplomatic instrument consists of the activities of a countrys diplomats to convince another party or state to comply with the desired policy preferences of the former. The military instrument refers to the outright use or employment of force to get states to comply with the desired policies. In this framework, the instruments of national power include only diplomacy and military. Economic strength is not included in the list. The economic aspect or the level of economic development is identified as a foundation and not as an instrument for the pursuit of national security interests and objectives. The reason being is that economic strength, as an instrument, finds expression in diplomacy (economic punishment or rewards) and a sophisticated military. Japan and the US are both economically prosperous countries, yet their abilities to influence the policies of other states differ. Diplomacy is commonly understood as belonging only to the realm of foreign relations. This is understandable since, in most cases, diplomacy finds its utility in the conduct of international relations. Under this framework, diplomacy is broadly defined as a means to shape the security environment by influencing policies and/or behavior of political actors, state and non-state actors alike, through an act of persuasion  [61]  . This definition extends to actors in the domestic arena and is not limited to international relations. This broader definition of diplomacy does not mean that all acts of persuasion are diplomatic acts. Diplomacy applies only to political entities or groups  [62]  . Interstate diplomacy and intrastate diplomacy have the same purpose and utility. The only difference between the two is that in the interstate diplomacy parties involve has mutual acknowledgement of their sovereignties while the opposite is true in the intrastate diplomacy. Example is the peace engagement the Philippine government had with the MNLF and the current peace engagement of the government with the MILF. Diplomacy in international relations is an act of one sovereign nation to influence the behaviors or policies of another sovereign nation by means of persuasion. Diplomacy is defined as such a process because one state (object of persuasion) is not subject to the laws the other (persuading state)  [63]  . Thus, the former cannot be compelled to behave according to the latters desire. In most cases, persuasion is a function of economic punishment or reward. Thus, effective diplomacy must be back up by economic rewards or economic punishment. This is one reason why the economic aspect is treated as foundation and not as instrument. Military instrument, like diplomacy is a function of economic development. Governments capability to acquire sophisticated military arsenal and build a strong and capable armed force depends on the countrys economic status. The modernization of the nations armed force requires the backing of its economic and technological forces, and the modernization level of national defense can only be improved gradually along with the enhancement of the countrys economic strength. Further, a capable armed force complements diplomacy. Often, when one carries a big stick, there is little room for discussion. The effectiveness of military and diplomatic instruments depends heavily on the states economic status. The question of when, how, and against whom these instruments will be used is a matter of choice of the people, as articulated by the government. Political unity and social cohesion, therefore, affects the manner, timing, and the object of the political instruments. The strength and effectiveness of the instruments depends on the strength and stability of the foundations of national security. 3.8 NATIONAL SECURITY INSTRUMENTS AND NATIONAL SECURITY FOUNDATION The elements of national power include social, politico-diplomatic, economic, and military aspects. Accordingly, national unity (consisting of social cohesion and political unity and solidarity), economic solidarity and strength, diplomatic and military strength and capability of the state are all identified in the literature as instruments, which the state may use in pursuing its national security objectives or interests  [64]  . Thus it is deems necessary to separate social cohesion, political unity, solidarity, and economic strength from the list of instruments. Although all of these are instrumental in the states successes or failures in pursuing national interests, it is important that they be distinguished, based on the functions they support. One reason is that the social, political, and economic aspects of security are often developed over a long period. Little can be done, at least in the short run, when the states reserves of raw materials, socio-political structure, and other initiatives require the formulation of a range of policy instruments that are not normally available. This distinction between the foundations and instruments of national security is perhaps best explained by the words of Malaysian Prime Minister Mahathir Mohammad when he defined security as follows, Security is not just a matter of military capability. National security is inseparable from political stability, economic success, and social harmony. Without these all the guns in the world cannot prevent a country from being overcome by its enemies, whose ambitions can sometimes be fulfilled without firing a single shot  [65]  . Political, economy and social stabilities are thus, contributors and essentials to achieve security. 3.9 SUMMARY In summary, in the literature, the people and the state are the only identified two distinct referents of security. This divide between the people and state is unwarranted. As it is, the people are an essential element of the state and that there are two organic/living components of the state: government and the people. The regime exercises authority over the people according to the political-legal ideology adopted by the state. However, there is an analytical utility in distinguishing the regime from the state. The usual equation of the regime with the state makes analysis difficult and the conclusions based on this analysis are often contestable. Sometimes, identified threats to state security are actually threats not to the state but only to the regime. Similarly, the interest of the regime is not equivalent to the interest of the state and the latters interests may in fact serve as threats to the security of the people. National interests composed of the peoples and the regimes interests shall be the responsibility of the state (people and government)  [66]  . In the realm of international relations, the state shall be the key actor (state is represented by the government). Although he acknowledges the existence of non-state groupings (i.e., multi-national companies and non-government organizations), he believes that the government remains the final arbiter on the demands of these groupings. The interests of these groups shall be included in the aggregation process and shall be included in the security agenda of the state.

Saturday, July 20, 2019

Mars, The Red Planet Essay -- essays research papers

Mars, it’s where aliens come from, a Hollywood Sci-Fi mainstay, the mysterious red planet. But, what is Mars really? Mars is the fourth planet from the Sun, orbiting 227,940,000 km away. It’s diameter of 6,794 km and mass of 6.4219e23 kg, makes it the seventh largest planet in our solar system.   Ã‚  Ã‚  Ã‚  Ã‚  Mars, which is the Greek name for the god of War, probably got this name due to it’s red color, and is often referred to as the red planet. What makes Mars look red? Mars’ atmosphere is mostly carbon dioxide, which oxidizes iron on the planet’s surface to create rust. Because there is very little water vapor on Mars, dry winds pick up and blow the dust around the planet, coloring it red.   Ã‚  Ã‚  Ã‚  Ã‚  What would you see if you went for a nature walk on Mars? Among the surface features are giant volcanoes and vast canyons. The largest volcano in the entire solar system is on Mars, Olympus Mons. It is classified as a shield volcano, similar to the volcanoes in Hawaii. Olympus Mons, three times higher than Mount Everest, is twenty- five kilometers high, surrounded by a 550 kilometer moat filled with lava. The Valles Marineris canyon is 4500 kilometers long and reaches seven kilometers deep and 600 kilometers across. There are also many meteorite impact craters.   Ã‚  Ã‚  Ã‚  Ã‚  Why couldn’t you take a nature walk on Mars? The atmosphere is not only very thin, it’s made almost completely of CO2 and known for its raging dust storms. You would...

Friday, July 19, 2019

Friendship - A Bond of Love and Hate Essay -- Personal Narrative Writi

Friendship - A Bond of Love and Hate Sarah and I had a fight about two weeks ago. We hadn’t fought in a while so we were due for a battle. Sarah complained that a girl at my party was â€Å"talking about her,† and, obviously, if I was a real friend, I should have kicked her out. Funny thing is I wouldn’t have kicked the girl out even if I had known that she was talking about Sarah. This, in turn, caused Sarah to tell that she hated me and never wanted to speak to me again. And, before you know it, we were the stars of our own episode of (insert title of melodramatic television show here). I started running around my house, idiotic and drunk, proclaiming that Sarah was the stupidest bitch I’ve ever met--well, I said a whole slew of bad words much worse than that but I’m trying to keep this clean--and that she needs to be run over by a bus, while Sarah ran up my street chasing her boyfriend (a subplot I won’t dare mention here) and text messaging me to let me know that I was a lyi ng piece of garbage. And, folks, this was just the beginning. I often relate my friendship to Sarah to the short story â€Å"Bartleby the Scrivener† by Herman Melville. Simply summed up, the story is about an unique friendship between two men that has a profound impact on each of their lives—a classic story of the one that gave too much and the one who could not help but to give too little. In my experience with Sarah, this role taking tends to rotate back and forth, which makes our friendship exciting, bewildering and, ultimately, both challenging and rewarding. To say that Sarah’s friendship has had an impact on my life would be like saying the Grand Canyon is a large gash in a rock that happens to be pretty. She has helped shape who I am and taught me r... ...d from his memory but during the expunging process realizes how much his memories, both positive and negative, of her are extremely valuable and worthwhile. Sarah and I, though our relationship is anything but romantic, agreed we would probably try to erase each other from our memories only to realize how much we care for one another after it is too late. Clearly, we are drawn to each other because of our similar immature, theatrical and, intermittently, pretentious personalities and through this bond of love and hate, up and down, back and forth, we learn from each other and grow as people in our relationship with not only one another but with others as well. She has been one of my greatest teachers, most annoying nemesis and unsurpassed melodramatic role-playing partner. More importantly, our ungodly fights have given me some of the best stories I’ve ever told.

Thursday, July 18, 2019

Volcanic Environment of Western Victoria

Stretching all the way from Melbourne to Portland, the plain is mostly flat and used widely for agriculture. Dairy farms, livestock, and vineyards are all examples of agriculture types found in the region. Major population centers in the region include Cameroon, Hamilton, Portland and Cola.The explorer Major Mitchell described this place as â€Å"a region more extensive than Great Britain, equally rich in point of soil, and which now lies ready for the plow in many regions, as if specially prepared by the creator for the industrious hands of Englishmen. † Western Victoria volcanic plain is one of the three largest volcanic plains in the world in scale, covering the region between Melbourne and Portland, which is over 15000 km. The signs of volcanic characteristics become apparent while driving west of Gelling, where some farms are littered with basalt.Scattered bluebonnets can be found around the area. Driving further west, walls built with volcanic rocks become more and more common. More than 400 vents of scoria volcanoes, marry volcanoes, imposed volcanoes, shield volcanoes and fissure volcanoes are unevenly distributed in the area, with a few youngest ones in the state such as Met. Napier. Other volcanic features such as stony rises, lava tubes/caves, tumults, lava canals and natural bridges can all be found in this area.The volcanoes are very significant to residents in the local region, as it bring fertile soil for agriculture and opportunities for other industries such as stone cutting or tourism. We can say that the local residents are dependent on the volcanoes. It is also an important volcano plain in Australia, as it is the largest volcanic plain in the entry. Lots of studies are being done in this region every year and some paleontologists come from overseas as well. Therefore even on an international basis the importance of this region cannot be ignored.It is recognized by the United Nation as a Global Cooperage and is the only one in Austral ia. Map Source: Textbook Scoria Volcanoes Scoria volcanoes are also called cinder volcanoes, and they are widely distributed in the western plains of Victoria and also the most common type of volcano in the world. Examples of this volcano in the region are Met. Elephant, Met. Narrator, Mr. Rouses and partly Red Rock. These volcanoes have steep sides, and are often formed by one period of volcanic activity. In the scoria cones, we can already tell from the name that we can find lots of scoria rocks. (Figure 1. ) They are small and red pieces of lava containing lots of vesicles in it. Met Narrator is one of the scoria cones we have visited in the trip. It is located near the small town of Narrator. Being the deepest scoria enclosed crater in the state, its crater is very large in scale, with more than 400 meters wide and 190 meters deep. (Figure 1 . ) Currently this volcano is extinct, and the area around is used for mostly dairy and cattle farming, and a little bit of tourism as well . Before the European settlers came to this region, this mountain is used as a trading place for the Karee Wrong people.Although it is located on private land, the volcano is still considered a part of the Swanking Global Cooperage and is still accessible through the Alan Marshall walking trail developed by the government, taking tourists to the top of the crater. Electric fences are set by the land owner to prevent tourists from entering private egging of the mountain. (Figure 1. 2)The highest point on the crater is about 310 meters above sea level, and the land around the mountain is extremely flat compared to the mountain itself. (Figure 1. 3) Figure 1. 2 Alan Marshall Trail.Photo by David Www Met rouse is another scoria volcano located about 1 km southeast of Pinehurst. It stands about 100 meters tall, and the dominant rock present is scoria and basalt. (Figure 1. 4) It is a extinct volcano as its last eruption occurred about 30000 years ago. A quarry is present at the foot of t he mountain and its main product is scoria. The scoria rocks was used to build roads and some buildings. It was closed in the late ass, simply because they ran out of what they're digging for. It has also been reverberated in the ass and the sign of it being a quarry is disappearing.Figure 1. 4. Some low-grade basalt and scoria in the quarry. Photo by David Www Shield Volcanoes Shield or Lava volcanoes account for about half on the Western Plains of Victoria. Its characteristics include gently sloping sides and a broad summit. (Figure 2. 0) Its formed by lava of low viscosity erupting repeatedly, forming layers of solid lava that lopes gently around the crater. Met. Napier and Met. Cottrell are all examples of this type of volcano. Lots basalt can be found in shield volcanoes. Figure 2. 0 Met Napier. Photo by David Www Met. Napier (Figure 2. ) is one of the shield volcanoes that we have visited. It is the youngest volcano in the state, which erupted about 7000 years ago, and therefo re considered dormant. It stands 440 meters above sea level and its located in the region about 25 kilometers south of Hamilton. Unlike Met. Narrator, Met Napier is located in public land, thus easily accessible. A scoria cone is present in Met. Napier, therefore scoria rock can be found as well. This is also one of the best-preserved volcanic landscapes in Victoria, as lava flows and caves can be seen clearly. (Figure 2. ) A scenic lookout is now developed at Harmony's Valley, and tourists can now observe the magnificent lava flow. Figure 2. 1, Baud Caves. Photo by David Www Dale Jerkin, a writer, included Met Napier in his book Aboriginal Dreaming Paths and Trading Routes, which reflects the significance of the mountain in the aboriginal community. It is now managed by the state government. Minor roads and tracks are built to take visitors to the summit. The land surrounding the volcano still stays quite rural, and is used for farming. Fissure Volcanoes Fissure volcanoes are forme d when there are long cracks in the surface of the crust.They usually have no central crater at all. Large quantity of lava will erupt through a linear array of volcanic vent distributed along the crack in the crust. Basalt seems to be the most common type of rock present in this type of volcano. Met. Cycles is an example of fissure volcano in the western plains of Victoria. Met. Cycles is located 42 kilometers south of Hamilton, 56 kilometers north west of Port Fairy and about 330 kilometers west of Melbourne. It elevates 178 meters above the sea level. Although its name is not a scoria volcano, the mount itself is a rounded scoria cone.Scoria rocks can be found in the volcano as well. Its previous eruption happened about 8000 years ago; therefore it's also considered a dormant volcano instead of an extinct one. The whole mountain is situated inside a national park, and is very well managed with facilities such as toilets, information boards, picnic tables and etc. (Figure 3. 0) Fi gure 3. 0. Information Center Photo by David Www Walking tracks are built to guide tourists through the park. There are 7 vents in total along the fissure, with a few under Lake Surprise, a popular swimming pool in the summer. (Figure 3. ) Currently this park is used mostly for tourism as a result of it having such magnificent and well-preserved volcanic features, such as vents, lakes, lava canals, natural bridges and etc. (Explained in later section of the report) Victorian aboriginals used to use this environment as their food source as they plant food on the land and trawl fish from the lake. A part of the park used to be a quarry or 50 years, providing scoria rocks for roads. Currently, natural growth of trees has been covering the evidence of a quarry and reconstructing the land into its previous appearance.Figure 3. 2. Lake Surprise. Photo by David Www Mars and Nested Mars Marry volcanoes are the second most common volcano type after scoria volcanoes. They are created when gro und water meets hot magma and produces steam. The pressure will increase in the ground when this process goes on and will last in an explosion. The explosion is usually vigorous and leaves a large hole in the ground. The bottom of the crater is usually lower than the original ground surface; therefore it may turn into a body of water. (Figure 4. ) During an eruption, large quantity of gas, water, ash, rocks and enigmatic material will be blown out of the crater. When the depart falls down back to the surface of Earth, it will solidify and become a volcanic rock called tuff. Examples of this kind of volcano in the Western Victoria Volcanic Plain include Tower Hill, Lake Knots, Lake Bullet Merrier and etc. They are mostly distributed in the southern region of Victoria, as they are spatially associated with the eater table present. Tower Hill is one of the many marry volcanoes in western Victoria and 13 km northwest of Workaholic.It presents itself like a shallow bucket embedded in the ground from an aerial view, as its crater is 4 km wide and 80 meters tall. Both scoria and tuff can be found in the crater. (Figure 4. 1) It is described as â€Å"a stroll among the gigantic ferns of the valley†¦ A ramble among the cones and craters†¦ The winding path at the foot of the basaltic rises close to the lake†¦ Almost tropical reeds rustle in the breeze†¦ Leafy shrubs and trees form delightful bowers and alcoves†¦ Tender motion in suitable company' by George Fenwick in 1858. Figure 4. 1 .Layers of tuff on the edge of the crater. Photo by David Www Indigenous Victorians and early settlers used the land as a source for firewood. It is then declared a national park during the year of 1892 to preserve its unique landforms. It is also the first national park in Australia. The park covers 612 hectares in scale. In the past century, Tower Hill experienced sever whether conditions such as the drought in 1930, and also experienced major changes such as th e vegetation in 1961. It is now very well managed and only used for tourism. Roads are built to take tourists down the crater.Picnic tables with electric BBC, viewing platforms and toilets are all examples of facilities offered in Tower Hill. Information centers are set up and guided tours are available to explain some of the characteristics of the volcano. Parking lots are available for cars. (Figure 4. 2) Figure 4. 2. Toilets, walking tracks and parking lots in Tower Hill. Photo by David Www Animal control is also a major issue in Tower hill. Koalas are brought to Tower Hill by humans, but apparently they have started to over generate and become a threat to he plants present. Figure 4. 3) They then had to be controlled by injecting a device in their body to stop them from breeding. Foxes, cats and rabbits are currently also considered invasive now as they manifested threat to other animals and plants in Tower hill Figure 4. 3. A koala in Tower Hill. Source: http://www. Irresponsib leness. Com/holidays/Victoria/travel-guide/great-ocean- road-wildlife-and-aboriginal-culture Lake Bullet Merrier is another example of a marry volcano located 4 km west of Cameroon. The crater has turned into a large lake about 2 km in diameter. (Figure 4. This volcano did not show significant elevation, however the northeast side of the crater is relatively higher than the rest of the crater rim as a result of prevailing wind. The lake used to be and is still used for fishing, and now it has also developed into a place for water activities such as water skiing. Other Volcanic Features Stony rises Stony rises are uneven surfaces on the ground. They are usually formed when old lava flow cracks on the top, causing the skin on the surface to sag and collapse. They are usually made of basalt and some scoria rocks. Those stones are used by European settlers for building fences and houses.There are not much management done for these stony rises, as they usually don't attract tourists, apa rt from year 1 1 geography students and other researchers. They are Just cleared out of farms for ease in farming. Stony rises are widely distributed in the western region of Victoria. Figure 5. 0 is stony rises around the town of Pinehurst, created by lava flow from Met. Rouse. Figure 5. 0. Story rises near Pinehurst. Photo by David Www Tumulus The word tumulus (Plural form: tumuli) means â€Å"Small hill† in Latin, and they are commonly known as lava blisters. They are a dome shaped half-spheres on the ground.Sometimes their roof will collapse. (Figure 5. 1) It's formed when gases in lava flow gather in a small area near the surface of the ground and they might also explode. We can think of them as â€Å"pimples in the ground†. They can be found in the region 40 km southwest of Hamilton. Figure 5. 1 . A tumulus located west of Met. Napier. Source: Textbook. Lava Tubes and Caves Lava caves and tubes are formed when a lava flow solidifies on the top but the lava below continues to flow. When the lava stops flowing under the solidified top, it empties out the space below the ground and creates the caves and tubes.Baud cave is a bunch of caves and tubes located in the region 20 km south of Hamilton. This landscape has developed into a park and became a part of Met Napier State Park and is managed by the state government. There are handrails built prevent tourist from falling into the caves, and walking tracks to guide tourists to the various caves. Some of the basalt rocks have been taken out of the caves to build infrastructures such as fences by indigenous people and early settlers, but now as it has developed onto a tourist attraction, those activities have stopped.