Monday, September 30, 2019
Chem
Organic Chemistry I Spring 2013 Practice test 1. Name the following compounds: a. 5-tert-butyl-7-isopropyl-6-sec-butyl-undecane b. cis-2-(5,6-dimethylheptyl)-6-(3-methylpentyl)piperidine c. trans -2-nonyl-3-octyl-tetrahydrofuran d. trans-1,6-dimethylbicyclo[4. 3. 0]nonane e. cis-6,8-ditert-butylspiro[3. 5]nonane f. 1,6-dimethylcyclohexene g. (Z)-3-bromo-4-fluoro-5-methyl-oct-4-ene h. (E)-8-(1-chloroethyl)nonadec-8-ene 2. Draw the structures of the following compounds: a b e c f d g h 3.Draw the structure of the following compounds in Newman projections and in chair conformations: a b c d e 4. Draw the most stable isomer of 1-tert-butyl-3-methylcyclohexane. a. Which atoms/groups are i. gauche to axial hydrogen on C2 A: t-butyl, C6, methyl, C4 ii. anti to equatorial substituent on C3 A: C5, C1 b. What is the relationship between: i. tert-butyl group and equatorial hydrogen on C2 A: gauche ii. equatorial hydrogen on C4 and C6 A: anti 5. Draw all isomers of 4-tert-butyl-2-ethyl-1-methylc yclohexane (ignore mirror images) in their most stable conformations.Arrange the structures from the least stable to the most stable. 6. Cyclohexylmethanol and 1-methylcyclohexanol are converted to their corresponding bromides. Write a suitable mechanism for each reaction, and assign each the appropriate symbol (SN1 or SN2). OH O H H Br H + :Br : SN2 :Br : O H H Br + H2O OH O H Br O + H2O + :Br : SN1 :Br : Br 7. Give the structure of the principal organic product formed by photochemical bromination of methylcyclopropane, draw the mechanism of the reaction. Br2, h? h? Br Br H . .Br Br Br Br 2Br . . + HBr Br + . Br
Sunday, September 29, 2019
Globalization and Technology Negotiation Strategy Article Analysis Essay
Globalization and Technology Negotiation Strategy Article Analysis Negotiation strategy and planning are important in understanding how a negotiator should engage the issue. According to Lewicki, Saunders, and Barry (2006), negotiators can achieve their goal easily by using an effective plan and acquiring a solid strategy in the negotiating room. In this paper, negotiation strategy will be discussed on how the United States is trying to resist globalization and technology from foreign countries in the global market. The following key elements will be discussed: (1) description of globalization policies, and (2) negotiation strategies with China. Description of Globalization Policies According to an article from uschamber.com (2011), businesses have become very high-tech and companies are concerned with global regulatory issues. The United States has joined international policy to help resist foreign globalization into the country. An example of negotiation policies is the use of Internet privacy, free trade agreements, and standards in the telecommunication market. The United States is using strong negotiation tactics to help persuade China and other countries to conform to globalization standards. Negotiation Strategies with China The negotiation strategy in dealing with China is through intimidation of military China has used a policy of secrecy in negotiation and has used their economic power to negotiate global agreements. Even though United States is a dominate military power, the negotiation strategy consists of a distributive bargaining style concerning the dealing of global economics with China. Chinaââ¬â¢s ultimate goal of globalization throughout the Southeast Asia is under a strict negotiation strategy of conflict management between the United States and China. The distributive bargaining style has been usedà by the United States when dealing with Chinaââ¬â¢s dominate role in economics. The United States has had to use accommodative negotiation strategy to help negotiate treaties with countries helping keep China in check from dominating globally. Example is how Taiwan has been threaten globally by China but the Unites States uses accommodations with other countries to help gain up on China. Summary and Conclusion In this paper, negotiation strategy was discussed on how the United States is trying to resist globalization and technology from foreign countries in the global market. The following key elements will be discussed: (1) description of globalization policies, and (2) negotiation strategies with China. In conclusion, distributive bargaining and accommodative negotiation strategies were discussed on how China global expansion has been kept at rest. China is a dominate economic power but Chinaââ¬â¢s expansion into global dominance is a rest throughout the world. Distributive bargaining has been used by China to take a hold on dominating the economic regulations put on other countries. China does not receive the same sanctions other countries may receive from political outcry. The United States is in losing situation when trying to negotiate economic sanctions on China but does have the power to stop China from globalization. Military power is used to help control conflict and only time will tell if China continues to back down in the global environment. References Globalization and technology. (2011). U.S. Chamber of Commerce. Retrieved from http://www.uschamber.com/issues/technology/globalization-and-technology Lewicki, R. J., Saunders, D. M., & Barry, B. (2005). Negotiation (5th ed.). Boston, MA: McGraw Hill. Retrieved from University of Phoenix, Resource, MGT/445 ââ¬â Organizational Negotiations: https://ecampus.phoenix.edu/secure/resource/resource.asp
Saturday, September 28, 2019
Is poverty the main factor affect crime
In the essay I'm going to talk about criminology and criminology is the scientific study of crime and criminals. Is one social group Involved In crime more than other social groups? Crime Is an unlawful act punishable by the state, harmful act or Arnold's against the public which the state wishes to prevent and which, upon conviction Is punishable by fine, imprisonment and in some countries death.No conduct constitutes a crime unless it is declared criminal in the laws of the country and poverty is the state of being extremely poor and being without things, having little none, not many material possessions and the need of essential goods. Being poor means people have nothing and struggle to survive every day. Some sociologist have suggest that being tortured with poverty after a while leads to evil thoughts and the struggle of being in the poverty cycle committing crimes gradually becomes a new way of them wanting to break out of the poverty cycle some say there a high correlation of poverty with crime .According to mainstream media under/working class citizens are more exposed towards crime, many theories of crime are based on national statistics with are taking out every year. According to official data the working class group are more likely to commit crimes then the middle class, sociologist have taken these figures and came up with theories on the case.Sociologist are beginning to seriously question if poverty is the main factor by using correctional data , this essay is going to argue about the factors affecting crime, if it's based on social statues or if more factors are involved. I will begin by stating that there actually is change in crime but also the people committing the crimes, although I'm talking about crime and the influences I'm still going to bring in other factor that ay have had an influence on the individuals committing the crimes . Or example psychical factor such as the biological explanations, sociological explanations and social biolo gical; I'm also going to be talking about the modern crime theories, sociology theories of crime, subcultures explanation of crime, biology theories and crime, genetics and criminal behavior ,psychological theories of crime and personality and crime expansions are psychology factors I'm going to people talking about and I'm going to talk about sociologist theories such as other crimes such as fraud, crime of passion , serial murder etc.Bear absolutely no link to poverty this suggest they may be an inverse link, since poor people are not in a position to carry out a crime like fraud or insider trading. No matter how much norms and values an individual has if poverty threatens his or her life then there likely to indulge into such criminal acts and could try to attack the prevailing social structure. Mom timer honest people who hate corruption from the depth of their soul fails to keep their mental balance and due to pressure of poverty they indulge Into crimes just to maintain their existence , the mainstream media only looks at the crime committed Instead of ending the real cause that lead the committee to such and act.Psychology AS for AKA [Crawled Clark Mildred] Fourth Edition psychopathology (Abnormality) section I used Psychology AS for AKA to do research on Freud this was a really good start for me, it clearly showed the psychology behind and crime and how I could structure is in my essay. But in reality I had to do more research of psychology behind crime on the internet because the book wasn't able to give out clear criticism of Freud theory and the criticism were needed in order for me to have a balanced argument.Overall the psychology be was very useful in giving me point hat I can adapted on and structure it into the essay but even though the little bit of information they had was helpful I personally believe it wasn't enough to help Sociology AY for AKA [Stephen moored Steve Chapman Dave Keen] Third edition crime and deviance section I used sociolog y AY for AKA to do research on criminology, I personally believe out of the entire book I went though it had the most information for me, it was useful and very resourceful.But the only problem I had with the book is that it had a lack of criticism for my essay and I needed it to keep my argument balanced. Overall, the sociology book was the most useful out of everything in my research but even though it was useful it still pushed me to for further research. John William] the seductions of crime' In this newspaper article John William tried to explain why crime exist with sociological evidence supporting what he has written, this was useful because [Tracy childish and Robert McDonald] ââ¬ËUnderstanding youth subcultures' Discussion MARXISM AND CRIME Marxist theory in general is that they believe that capitalism can only thrive though the explorations of the working class, Marxist believes that they're a clear link teen human nature and the way we operate in a capitalist society.M arxist believes that capitalism is not only an economic system but is also a political system, in all aspects of society ; this provides the bourgeoisie with a supple mass of workers who do not mind working for external rewards of a constant wage. Some people say that the main factor that links in with crime is poverty and strong example of people who think this is Marxist. Marxist see crime as not coming from moral or biological defects but defects with social order (social control), Marxist say that crime happens because of social class differences . Irking class crimes are a lot more common if you don't conform to the unjust system then you will be punished, for example intuitions such as the polices and the Justice system encourage individuals to conform. Marxist argues that white collar crimes with tend to be committed but middle class are ignored , while blue collar crime which are crime committed by working and underclass such are robbery are more focused on in the media. Mar xist say this is a superstructure because it maintains and reflects ruling class ideology. The state (people in politics) who are part of the middle class pass laws which is inefficiency towards them .Laws are made by the state which represent interest of the state which has positive impact on ruling class and negative on working. Marxist would also argue that crime is an inevitable part of capitalism as it stem from social inequalities because working class crime is caused by labor exploitation and lack or materials. Traditional Marxist believes that majority of the population are exploited by the ruling class (the bourgeoisie), exploitation provides the key to explaining why less privilege people commit crimes. They focus on the unequal conflict between the woo classes of society.Marxist believe it's by nature it inevitably causes crime, this is called carcinogenic ; Marxist see crime in the capitalist system as a tool of the ruling class where they can control the working class a nd crime Marxist say crime is unavoidable because of the result of the oppression the working class are in by the state. An example of were the state oppresses the working/underclass is that 80% of laws that exist is to protect private property, this suggest that the state are more concerned about martial and possession then they do about they're society and the peoples well-being.Neo Marxist are another branch of Marxism also known as radical criminology; they discuss more contemporary ideas of crime. They believe that the Marxist theory is too simplistic they are wider factors that lead to recidivism. Traditional Marxist view crime in 3 key aspects; Carcinogenic capitalism ââ¬â idea that crime is inevitable because of the nature of capitalism is Marxist idea that crime and their ideas e. G. Such as saying crime is a result out of political anger.Carcinogenic capitalism is the Marxist idea that crime is inevitable because of the nature of fatalism. ; The state and law making- l aw enforces widely supports the ruling class over the working class because the law making widely supports the ruling class over the working class, Marxist claim that laws enforced are very selective and repressive e. G. The police largely ignores crimes of the powerful in society and instead focus on; Ideological functions of crime and law-Marxist claim sometimes laws are passed that- on surface to benefit the working class.According to the Marxist theory of crime it highly suggests that they do believe that poverty is the main factor when talking bout crime. However, one criticism of Marxist theory towards crime is white collar crimes. White-collar crime refers to financially motivated nonviolent crime committed sociologist Edwin Sutherland in 1939 as ââ¬Å"a crime committed by a person of respectability and high social status in the course of his occupation. â⬠An example of a white collar crime is false advertising, anti-trust violations, environmental pollution or dumping product on the market below cost.This goes against Marxist theory because they believe that crime is only done by the working class because of the huge divide teen the upper and the working class but Marxist theory doesn't explain why middle class people are committing crimes. White collar crime carried in a business or fraud. Because most of the time it is done on a smaller scale, it is harder to detect when the crime is being committed. However, when it is caught out, a lot of the time the criminal isn't punished as harshly.Reasons for this could be that the crime isn't as serious as violent crimes or to save the reputation of the company that the person has been stealing from whilst working there. However, in larger scale situations, the crime is more than likely to be reported. One the other hand, another criticism to Marxist is Cambridge University study and they came to the conclusion that Poverty is not an excuse for crime as morality is the biggest factors commit crime beca use they lack morals and not Just because of the environment they live in, according to a new study.Cambridge University studied around 700 young people in Petrography for over a decade and discovered that most adolescent crime is not Just because of poverty. In fact, while it is agreed that urban environments trigger some young people to commit crime, it is their morality which is the biggest factor. Other managers that were experiencing similar situations as the young criminals remain highly resistant to committing crime because they were raised with morality.Functionalist perspective on crime Functionalist main theory is that believe social order benefits everyone, crime is bad as the weak suffer, social progress would be limited by disorder and all would suffer, thus crime must be limited, some crime can be positive. They believe some crime can be positive because can act a warning device, can help society progress, provides employment, acts as a safety valve, helps social cohes ion, reinforces the boundaries f society.Druthers believed in consensus and the need for social order, basis of society was a set of shared values which guide our actions called the collective conscience, tells us what is acceptable and what is not, re-affirming boundaries, and anomie. Functionalist believe that crime is inevitable in society, this means that it's almost impossible for crime not to exist because not everyone will buy into the collective sentiments of society and some few may deviate from these social norms and beliefs Druthers argued that crime is an inevitable and normal aspect of social life.Crime is present in all types of society; indeed, the crime rate is higher in the more advanced, industrialized countries. According to Druthers, crime is an ââ¬Ëintegral part of all healthy societies'. It's inevitable because not every member of society can be equally committed to the collective sentiments (the shared values and moral beliefs) of society since individuals are exposed to different influences and circumstances, it is ââ¬Ëimpossible for all to be alike' . Functionalist believes that certain amount of crime and deviance as normal and an integral part of all healthy societies.This is because it acts as a ââ¬Ësafety valve', providing a relatively harmless way for someone to express their discontent. For example, Cohen said that ââ¬Å"prostitution family', this is because he believed this crime of prostitution could relieve the stress in a discrete way without damaging the rest of the clients life. Clarinda said crime also served the function of acting as a warning device. This is because the crime indicates that there is an aspect of society that is malfunctioning. So the crime draws attention to the problem within society, which can then be fixed.Druthers said that crime in society isn't genetically produced, but is natural in society. However, he did say that too much crime was dangerous in a society, and this is an idea Morton de veloped. To conclude Functionalist believe that crime is inevitable which means that anyone can commit it, this is because not everyone will buy into the collective sentiments of society and some may deviate from these norms and beliefs. However, Druthers doesn't explain why certain people are more likely to commit crimes than others.He appears not concerned with this problem ââ¬â he was most interested in the nature of the relationship between crime and order in society. If questioned on individual motivations of criminals, he would probably have invoked their lack of solicitation. Also, he stresses harmony of society and the belief that the law reflects the interests and views of the majority of the population, but he seems to ignore the concept of power ââ¬â it is generally accepted that in all societies some groups have greater ability than the bulk of the population to influence the law making process.Marxist, for example, argue that the powerful in society control the law making system along with everything else and thus are able to pass laws which eight appear to be fair but which actually work to help preserve their position of power. Thus, the criminal system may not be as harmonious as Functionalists believe; indeed, Functionalists are often criticized for looking at life through rose tinted glasses which means they see everything as it was positive but they don't look at the true picture.Biological theory of crime Another factor they may have a link to crime is the biological theories of crime. Biological Theory is a peer-reviewed scientific Journal covering the fields of evolution and cognition. Biological theories are based on the nature versus nurture debate. Are we born criminals or do we learn crime, biological theories also see crime as a form of illness caused by pathological; factors specific to certain classes of individuals which is bad behavior vs.. Sick behavior. ââ¬ËDoes the way you look say that you are a criminal?Limbos (18 76) introduced the first theory. We can assume that some people are ââ¬Å"born criminalsâ⬠Punishment is inapplicable. Limbos (1876) believed that you have an innate predisposition towards criminal behavior, In other words crime is something you are born to do. We frequently make inferences about another arson's character based on his/her appearance Ancient Greeks and Romans believed in ââ¬Å"physiognomy' (physical features can reveal a person's natural disposition) for example ââ¬Å"Do not trust beardless men and bearded womenâ⬠.Cesar Limbos was an Italian criminologist who in 1876 promoted the theory of ââ¬Ëanthropological determinism' that essentially stated that criminality was inherited and that someone ââ¬Å"born criminalâ⬠ââ¬Ë could be identified by physical defects, which confirmed a criminal as savage. Limbos believed that by studying someone's physical features, you could identify a potential criminal. Lumbago's criteria for this cheekbones, flatte ned or upturned nose; handle-shaped ears; large chins, very prominent in appearance; hawk-like noses or fleshy lips; hard shifty eyes, scanty beard or baldness and insensitivity to pain.Limbos finally concluded that a criminal would have long arms. Lumbago's studies of female criminality began with measurements of females' skulls and photographs in his search for ââ¬Å"atavismâ⬠. He concluded that female criminals were rare and showed few signs of ââ¬Å"degenerationâ⬠because they had ââ¬Å"evolved less than men due to the inactive nature of their livesâ⬠. Limbos argued it was the females' natural passivity that withheld them from breaking the law, as they lacked the intelligence and initiative to become criminal.Limbos had also stated that these criminals behaved in a different way to everyone else. These different behaviors are as follows an inability to adjust to social and moral issues an inability to differentiate between right and wrong, a low inability to sh ow any kind of guilt or remorse, an inability to show any kind of feelings toward, and an inability to form any kind of relationship. However, Biological theory as much criticism but in the following paragraph I'm only going to speak on 3 of them.The first criticism is Goring (1913) in his experiment he criticized Limbos on the issue of born criminal and found that such thesis is inaccurate as well as dangerous, he tested a group of criminals and non-criminals to see if they showed any differences in behavior and he found that no significant difference between them, he then concluded that no one is criminal until he or she commits a crime.Another criticism of the biological theory is environmental factors, this is because hey may have had a poor family history in which they were deprived of their mother at a young age (hence maternal deprivation) or they lived in poverty for many years and had trouble coping with bills or buying food to eat. They may have been subjected to crime at a young age because they may have had a parent who took drugs or smoked and if there was no money to buy the drugs then they would be made to steal in order to get the money.However, the next criticism of the biological approach is stereotyping and encouraging stereotyping would then encourage prejudice and discrimination. For example if children are shown a picture of a man with upturned nose; handle-shaped ears or large chins , they will indicate a negative attribution towards the picture rather than to a picture of a man without upturned nose; handle-shaped ears; large chins (these features on a man are known to be a good indicator of being a criminal).Yet, the only problem with stereotyping is that there is no strong evidence to prove it and that the research methods used were defective. It has also been criticized on methodological grounds because a proper control group hasn't been used so it can't be reliable. Psychological explanations of criminal behavior Psychological theor y which has first developed by Freud this states that all humans have natural drives and urges that is repressed in the unconscious. Additionally, all humans have criminal tendencies. These tendencies are curbed, however, through the process of Colonization.A child that is improperly socialized, then, could develop a personality disturbance that causes him or her to direct antisocial impulses either inward or outward. Those who direct them inward become neurotic while those that direct them outward become criminal. Freud had his own views on what makes a as a result of an overdeveloped superego. People with overdeveloped superegos feel guilty for no reason and wish to be punished in order to relieve this guilt they are feeling and committing crimes is a method of obtaining such desired punishment and relieving guilt.In effect, a person commits the crime so that they can get punished and thus relieve guilt ââ¬â the guilt comes before the crime. According to this view, crime is a result of a poorly integrated psyche. Freud also identified the ââ¬Å"pleasure principleâ⬠; that humans have basic unconscious biological urges and a sire for immediate gratification and satisfaction. This includes desires for food, sex, and survival. Freud believed that if these could not be acquired legally, people would instinctively try to do so illegally.Freud also believed that people have the ability to learn in early childhood what is right and what is wrong and though we may have an instinctive nature to acquire what we desire, such nature can be controlled by what is learned in our early years. He believed that people primarily get moral principles as a young child from their parents and that if these were missing because of poor renting, that child would grow up into being less able to control natural urges to acquire whatever is needed. However, the greatest criticism of the psychodrama approach is that it is unscientific in its analysis of human behavior.Many of t he concepts central to Fraud's theories are subjective and as much impossible to scientifically test. For example, how is it possible to scientifically study concepts like the unconscious mind? In this respect the psychodrama perspective is unfeasible as the theories cannot be empirically investigated. However, Kline (1989) argues that the psychodrama approach comprises a series of hypotheses, some of which are more easily tested than others, and some with more supporting evidence than others.Also, whilst the theories of the psychodrama approach may not be easily tested, this does not mean that it does not have strong explanatory power. Nevertheless, most of the evidence for psychodrama theories is taken from Fraud's case studies e. G. Little Hans. The main problem here is that the case studies are based on studying one person in detail, and with reference to Freud the individuals in question are most often middle aged women from Vienna I. . His patients. This makes generalizations to the wider population (e. G. The whole world) difficult.Another problem with the case study method is that it is susceptible to researcher bias. Re-examination of Fraud's own clinical work suggests that he sometimes distorted his patients' case histories to ââ¬Ëfit' with his theory Galloway, 1991. The humanistic approach makes the criticism that the psychodrama perspective is too deterministic ââ¬â leaving little room for the idea of personal agency I. E. Free will. Finally, the psychodrama approach can be criticized for being sexist against women. For example, Freud believed that females' penis new made them inferior to males.He also thought that females tended to develop weaker super ego and to be more probe to anxiety than males. Also the theory such as id ego and superego are difficult to define and research. Sub cultural Explanations of crime Subcultures theories are theories which examine the behavior and actions of various groups within society these groups which rej ect or depart from the subcultures, and subcultures theories attempt to explain why these groups most are concerned with youth gangs' and gang delinquency engaged in criminal acts . N 955 Albert Cohen came up with status frustration ,this is seen as a functional perspective of subcultures behavior (it improves their status) many working class youths who cannot gain status legitimately, become frustrated and therefore try to gain status through illegitimate means then they create their own subculture and reject the norms and values of mainstream society. Cohen have noted that Delinquency was lower in areas of high economic status while it was seen to be high in areas of low economic status linking back to Marxist theory that people of a lower class background are more likely to commit crime.Their studies also found that these findings remained constant over time, They therefore came to the conclusion that ââ¬Å"delinquency-producing factors are inherent in the Community and is cultu rally transmitted. Another explanations for subcultures and crime is Miller (1992) and Miller does not see the criminal behavior occurring due to the inability of the lower class groups to achieve success. Instead, he explains crime in terms of the existence of a distinctive lower class subculture.He believes that this lower class group has for centuries possessed their own culture and traditions with a fundamentally different room those in the higher classes. This thus suggests that this lower class culture has been passed on not by one generation but for much longer than this. What are the Concerns of this Culture, Compared with the Higher Strata? Toughness: this involves a concern for masculinity and finds expression in courage in the face of physical threat and a rejection of timidity and weakness.In practice this can result in assault, and battery as the group attempt to maintain their ââ¬Ëreputation'. Smartness: this involves the ââ¬Ëcapacity to outfox, outwit, dupe, and take others. Groups that use these sequences, include the hustler, conman, and the cardsharp, the pimp and pickpocket and petty thief. Excitement: Involves the search for thrills', for emotional stimulus. In Practice it is sought in gambling, sexual adventures and booze, which can be obtained by a traditional night out on the town. Fate: They believe that little can be done about their lives ââ¬â what will be will beâ⬠¦Trouble: young working class males accept their lives will involve violence, and they Will not run away from fights. However , one criticism of sub cultural theory is Miller claim that the six focal encores are central of sub cultural tradition but he doesn't give enough evidence to show that this is lower class values , therefore how are we supposed to trust miller theory on sub cultural if it's not reliably. Also miller says that it applies to male's right across the class structure but doesn't give any mythological evidence.Another fundamental weakness of these theories stems from precisely this: an overemphasis on the importance of a ââ¬Ëgang response' to crimes, it places far too much attention on a group response rather than on individual responses. Notwithstanding the fact that cost Juvenile crime such as Joy-riding is conducted by ââ¬Ëgangs', these theories fail to explain why crimes such as rape and murder, which are very individualistic, occur Gender and crime According to official static there an overwhelming predominance of males compared with females on committing crimes.Given this there has to be something in the these difference . Len the paragraph I'm going to explain why there are gender differences in offending rates and to be able to explain sociological evidence for the reasons from different offending rates,. Sex-role theory argues that women are less keel to commit crime than men because there are core elements of the female role that limit their ability and opportunity to do so. There are a number of differe nt versions, all of which can fit quite comfortably together.The first form of sex role theory is solicitation, this is the process by which children and adults learn from others. We begin learning from others during the early days of life; and most people continue their social learning all through life process : according to this approach, girls are socialized to be famine, polite and innocent while boys are socialized to be masculine strong and powerful. Over all this explains the large inequality when it comes to crime suggesting it's not males fault that they commit crime its societies fault for enforcing social roles on children.According to Gender and crime theory male colonization is the main factor of crime. The second form of sex role theory is Normalization this is the idea that males are opportunist because they have m However, the gender and crime theory is criticized because Frances hedonism say that criminology has tended to be dominated by males, in the main they have been studied by men and the studies have been about men. This may be an explanation of the big difference between males and females in crime .Frances hedonism has suggested 3 reasons for this and the first one is the most obvious and it's that male dominance of offenders this has an impact because many sociologist are more likely going to study them rather than the minority of female offenders . The second explanation for lack of information on female crime is male domination in sociology and this suggest that the majority of academics have been male this suggest investigations have been a reflection of males view points and intersect.And the last reason hedonism put forward was sociological theorizing this is the idea that male sociologist constructed there theories and not thinking how It could be applied to females, this is because most traditional theories are gender blind in affect that means they ignore the specific viewpoint of women. To conclude the objectives of this essay was to argue if one social group involved in crime more than other social groups?Make a clear distinction between what other factors cause crime, to analysis the arguments for and against whether poverty is a justification of crime and to draw a conclusion to weather poverty is the mother of crime. I believe that in my argument I was able to reach all my objectifies . The original purpose of this study is to examine the different perspective on crime and come to a sensible conclusion on whether it was Justified for people under the bread line to commit crimes and to come to a conclusions if it is fair for them to go prison if being court..By looking at the evidence and argument, I must conclude that poverty is a key factor when approaching the theory of crime, the reason why I say this is cause both Marxist and the sub cultural theories both agree one the fact the poverty and crime have and ongoing relationship, but they also bring in key evidence to back .But according to the info rmation I got from my AY sociology book middle class individual It would have been unwise from the outset to assume that I would have come to an absolute Answer to my research question due to the wide range of factors that have been researched. The project has allowed me to explore to a great depth a topic not only of great interest to me, But one that will bear great important during my future as a social psychologist.
Friday, September 27, 2019
Southern Company Case Study Example | Topics and Well Written Essays - 1250 words
Southern Company - Case Study Example Therefore, they fail to achieve desirable management of talent in the organization. Finally, the Southern Company has functional expertise, which increases the chances of the company identifying appropriate human resources for its electric utility activities. ââ¬Å"Evaluate the effectiveness of the roles that the strategic leaders played in the formation of the performance management strategyâ⬠. There was a deliberate improvement in the entire leadership of the company. The improvement was strategic because it enabled the corporation achieve better achievement. Consequently, the effectiveness of this step to empower leaders concentrated on the suggestions in management books. ââ¬Å"The Leadership Pipelineâ⬠, is a book that encouraged Southern Company leaders to diversify their strategies. The leaders also determined the respective results that they needed to achieve in order to improve performance (Kandula, 2006). Indeed, this strategy was effective because it enabled the strategic leaders to form desirable and applicable strategies in managing their respective talents. In addition, the strategic leaders ensured there was an implementation of a plan that would increase their performance. For example, the plan entailed the formation of certain guidelines. Consequently, the guidelines focused on how to improve the performance of management. The effectiveness of this strategy was the creation of order in the delivery of managerial responsibilities. For example, the guidelines would reduce any confusion from lack of sufficient preparing (Goldsmith, Marshall, Carter, Louis, & B.P.I, 2009). Other efficiencies of the roles played by the strategic leaders include preparing for future talents by identifying potential successors. This strategy enabled the management of Southern Company to determine the nature of talent they had during operational periods. This is because the strategic leaders encouraged willing human resources to agree to certain leadership p ositions in the future. Additionally, there was enhancement of performance because of the requirement to state the time that an individual was ready to perform diverse tasks. Moreover, the human resources of Southern Company work hard to achieve the required experience for promotions in the organization. This is effective because the strategy forces employees to increase their respective competencies. In particular, the management of Southern Company used its leaders in diverse departments to increase the performance of the entire company (Armstrong, 2011). ââ¬Å"Develop a five (5) point criteria for evaluating the effectiveness of the talent management strategy and how the data could be collectedâ⬠1. Talent management focuses on diverse programs and cultures in the respective organization. These programs and cultures retain all the available talent in organizations like Southern Company. 2. Additional programs that are part of the strategy for managing talents in organizatio ns include the rotation of duties (Armstrong, 2011). 3. Research into emerging processes of talent management is equally crucial. 4. The managers can alter their respective duty rosters in order to determine the best department for each employee. This will also ensure that employees perfect their diverse talents hence being effective in whatever department (Goldsmith, Marshall, Carter, Louis, & B.P.I, 2009). 5. In addition, the management of talent also includes retaining talent for lengthy periods in order to create loyalty. This is because loyalty increases performance in
Thursday, September 26, 2019
Cultural values Assignment Example | Topics and Well Written Essays - 1000 words
Cultural values - Assignment Example There is a significant difference in the themes of Japanese people when compared to the American population. Within the American society, the rights of every individual become established and are not subject to cultural expectations. While similar fundamental rights to choice remain available within the constitution, the Japanese society perceives cultural values as superseding constitutional rights. Married women in Japan are therefore expected by the society to leave their careers and become full-time mothers. Individuals who opt to follow different paths find life increasingly difficult because of the cultural expectation. In contrast, the American society presents limited cultural expectations because of the multiple cultures making the American society. The diversity within the American culture remains the fundamental reason behind the absence of cultural expectations, and reliance on fundamental rights provided by the constitution.There are numerous cultural values within the J apanese society forming the base for the cultural beliefs. Empathy and human relations remains a fundamental aspect of Japanese culture, and are regarded as part of life. The Japanese believe that human emotions like love and anger come from the gods; hence showing love to others and resulting relations become valued within the society. Indentify oneself with another ââ¬â empathy, remains highly valued within the society. Children are taught that human fulfilment emanates from close relationships with others.... Children are taught that human fulfilment emanates from close relationships with others (Nathan, 116). The Japanese believe that success comes forth through combination of efforts from different people. Order and status could be identified as the second fundamental aspect of Japanese society. The value is based on the Japanese belief in the philosophy of Confucianism, which emphasizes on harmony with nature, displayed through an individualââ¬â¢s contribution to social order and proper behaviour. Tranquillity and happiness are the fundamental results sought through the value of order and status (Slater and Robson, 360). Understanding of oneââ¬â¢s social status in Japan remains fundamental in establishing relationship with others. While the status of individuals forms an essential element within the Japanese society, goals and self remain the fundamental aspect behind the establishment of the status. The element of individuality within the society becomes immensely admired wh en the individuals becomes perceived as sincere. While individuality is admired, extreme cases become negatively perceived as selfishness; which becomes the opposite of the value of empathy and human relations. The combination of these fundamental values presents a satisfactory balance between the society, environments, and the individual (Doi, 57). These values remain significantly important to the society, as they have contributed to the continued peaceful progression of the Japanese nation. Question 3 The social structure could be defined as a combination of different social arrangements resulting from and causing actions by members of the society. Social institutions have a significant impact on the roles played by
Business Plan Assignment Example | Topics and Well Written Essays - 2500 words
Business Plan - Assignment Example To this end, learning master has identified a niche market for its products. The companyââ¬â¢s market is composed of all the foundation campuses located in London. Learning master has tailored its products to serve the linguistic needs of foreign students in London. This market gives the company access to students in foundation campuses in London, who are approximately thirty thousand. Psychographically: psychographic segmentation gives a business the opportunity to divide its clients according to their lifestyle, social class and personal preferences. For Learning Master, this group will be composed of students who are interested in English and do not perform well in their academic subjects because of their low mastery of the English language. These students also aware of the importance of proper mastery of the English language and expect to use the Universities and College Admissions Service (UCAS) to go to good universities in the UK. Geographical segmentation: In geographical segmentation, the students will be grouped depending on their location. Learning Master intends to group the students depending on where their foundation campuses are. Like central London will have Birkbeck, UCL and KCL while the greater London will focus on City University. Demographical segmentation: demographic segmentation divides the market into small groups based on their age, gender, occupation and income. Learning master will divide the students depending on their ethnic background, age and income. Like any other business, Learning Master has competitors who have been in the market offering English lessons either online or direct classes. Some of the companyââ¬â¢s competitors are online English tutors like BK English who offer their lessons through the internet; their services are cheap and cost à £ 20. Since they use the internet, they tend to be more flexible and promote their products through the internet. Despite being cheap they cannot be trusted by
Wednesday, September 25, 2019
HW Essay Example | Topics and Well Written Essays - 250 words - 4
HW - Essay Example For example, will you limit your clientele, or be neutral? The quiz highlighted only some minor areas that may be uncomfortable, such as discovering sexual orientation of people, who was initially believed to be traditionally heterosexual. As such, in my professional life, I plan to manage seemingly uncomfortable situations by being holistically prepared to handle them. This means that I should have enough theoretical background on addressing sensitive issues and be emotionally, or even physically and mentally adept to respond and react accordingly. As such, I could assume a more neutral stance if I am well-equipped and prepared to handle unexpected uncomfortable situations. 3. What is your opinion on intersex and transgender athletes competing despite their differences from the norms of athletics? Is it cheating for a female with naturally very high levels of testosterone to compete with females? Is it fair to have a transgendered male to female individual compete against other females? In terms of intersex and transgender athletes competing despite their differences from the norms of athletics, I strongly believe that the law of equality and fair play should preside. This means that as long as these athletes perform and have shown competencies in their sports endeavors, the gender or sexual orientation should not be an issue. Thus, a female with naturally high levels of testosterone could compete with females, unless this factor would give unfair advantage. As such, if she has prior knowledge of this, I affirm that it should be disclosed to the sports committee prior to joining. In terms of having a transgendered male to female individual compete against other females, again, I believe that unless some factors inherent to them (transgendered male or female) would give unfair advantage, they could actually compete with other females. The sports
Tuesday, September 24, 2019
Gendered Roles in The Tale of Genji Essay Example | Topics and Well Written Essays - 1000 words
Gendered Roles in The Tale of Genji - Essay Example Notable among themes is the illustration of unique livelihoods of high courtiers at the time of the Heian period. This illustration also qualifies the social constraints and liberties which men and women faced in the Heian period, as shall be seen forthwith. Social Constraints Which Compelled Elite Men and Women to Negotiate As Part of Their Privileged Status In the Tale of Genji, there are particular sorts of social constraints which compelled men and women to negotiate as part of a privileged status. In the Genji Monogatari, it is the concept and reality of class and class consciousness. She is not able to fit into the life in palace, despite being the queen, Lady Kiritsubo. As is provided for by Seidensticker, the grand ladies in the palace regard her as a presumptuous upstart while ladies who hold lesser or lower social standing than Lady Kiritsubo are resentful towards her. The gravity of this development is portrayed as being highly potent since the same affects the queenââ¬â ¢s psychosocial life: she falls ill and becomes more frequently at home, than at the palace1. Again, it is indisputable that lifeââ¬â¢s natural courses are constraints and forces which compel men to negotiate as part of their privileged status. Since man must die, he has to genetically propagate himself and his genes. Marriage is the environment in which propagation is done, and love is the force which creates this environment and also sustains it. To get into marriage, all like Emperor Kiritsubo had to negotiate with their fiances or girlfriends. Despite the glaring disparity of fortunes, Emperor Kiritsubo falls in love with Lady Kiritsubo, marries her and sires Genji with her. At a certain point, Emperor Kiritsubo, Emperor Suzaku, Kokiden, Lady Fujitsubo and Genji die. One of these constraints is the integration of individuals to their occupation, in lieu of their personality and character. To this effect, none of the characters in the original texts are assigned explicit name s. All characters are referred to, in relation to their roles, their social standing and the relations that these characters have with other characters. This is the case so that there is the Minister to the Left, His Excellency and the Heir-Apparent, respectively2. While this development above may soothe the ego of aristocrats and people with reputable occupations, it may also serve as a source of stigma to those who are less privileged in the society. In the same wavelength, referring to people by their character may subject the same to prejudice and stigma too strong to allow them the power and chance to reform. Anyone who is always and consistently referred to as a thief may not see the need to reform as that label is permanently stuck on him. The same may also entrench classicism since those who are poor and weak in the society are referred to as such. The elite are always referred to by their honorifics and thereby entrenching their sense of self importance. The Greatest Source s of Freedom (Or Joy) and the Greatest Constraints on Individual Identity That Men And Women Faced In This Age, As Seen In the Novel Some of the greatest freedoms which men and women enjoy in the Heian Period are biologically induced, meaning that because of biological reasons, certain
Monday, September 23, 2019
Fundamental health law Essay Example | Topics and Well Written Essays - 500 words
Fundamental health law - Essay Example Mr. Russell wants to go ahead and sue the state that giving him the vaccine against his will is a complete violation of his personal autonomy under the 14th amendment of the constitution of the United States. Mr. Russell has a valid argument in his wish to file for a case against the state, despite the fact that the U.S constitution does not have any direct rights to privacy, however one is entitled to a right of privacy under the personal autonomy, an individual is allowed to choose whether to take part in precise activities, or subject themselves to particular acts. This precise personal autonomy is a liberty that is safeguarded by the due process clause of the 14th amendment; this liberty is defined in a general and narrow way whereby one is entitled to the rights of privacy in the family, child rearing ad other social activities. With this in mind, it is legal for Mr. Russell to refuse to be vaccinated. A good references case to why Mr. Russell have a viable argument in court the Jacobson v. Massachusetts in 1905 at the United States .Supreme Court. The implication of the Jacobson v. Massachusetts in relation to the one of Mr. Russellââ¬â¢s vs. the State is the rights to pressure citizens in circumstances that are not applicable. The case at hand was whether the state had the right to force Mr. Jacobson to receive a vaccination. This is after a law had been passed in the Massachusetts sin the year 1902 that required all people who had not received any vaccination for the last five years to receive one, failure to that would result to a fine. Jacobson declined to this order and the fine as well and filed for a case against the state, his argument was the state invaded on his personal autonomy. The Supreme Court in Massachusetts ruled in favor of the state, this was because despite the legal personal autonomy rights that an individual
Sunday, September 22, 2019
Judicial Law-Making Essay Example for Free
Judicial Law-Making Essay The independence of the judiciary was ensured by the act of settlement 1700, which transferred the power to sack judges from the crown to the parliament. Consequently, judges should theoretically make their decisions based purely on the logical deductions of precedent, uninfluenced by political or career considerations. The eighteenth century legal commentator, William Blackstone, introduced the declaratory theory of law, stating that judges do not make law, but merely, by the rules of precedence, discover and declare the law that has always been: the judge being sworn to determine, not according to his private sentiments ot according to his own private judgement, but according to the known laws and customs of the land: not delegated to pronounce a new law, but to maintain an expound the old one. Blackstone does not accept that precedent does not even offer a choice between two or more interpretations of the law: where a bad decision is made, he states, the new one that reverses or overrules it is not a new law, nor a statement that the old decision was bad law, but a declaration that the previous decision was ââ¬Å"not lawâ⬠, in other words that it was the wrong answer. His view presupposes that there is always one right answer, to be deduced from the objective study of precedence. Today, however, this position is considered somewhat unrealistic. If the operation of precedent is the precise science Blackstone suggested, a large majority of cases in the higher courts would never come to court at all. The lawyers concern could simply look up the relevant case law and predict what the decision would be, then advise whichever of the clients would be bound to lose not to bother bringing or fighting the case. In a civil case, or any appeal case, no good lawyer would advise a client to bring or defend the case that they had no chance of winning. Therefore, where such a case is contested, it can be assumed that, unless one of the lawyers has made a mistake, it could go either way, and still be in accordance with the law. In practice, thus, judges decisions may not be as neutral as Blackstones declaratory theory suggests: they have to make choices which are by no means spelled out by precedent. Yet, rather than openly stating that they are choosing between two or more equally relevant precedents, the courts find ways to avoid awkward ones, which give them the impression that the precedents they do choose to follow are the only ones they could possibly apply. Ronald Dworkin argues that judges have no real discretion in making case law. He sees law as a seamless web of principles, which supply a right answer and only one to every possible problem. Dworkin reasons that although stated legal rules may run out (in the sense of not being directly applicable to a new case) legal principles never do, and therefore judges never need to use their own discretion. In his book, laws empire 1986, professor Dworkin claims that judges first look at previous cases, and from those deduce which principles could be said to apply to the case for them. They then consult their own sense of justice as to which apply, and also consider what the communities view of justice dictates. Where the judges view and that of the community coincide, there is no problem, but if they conflict, the judges then ask themselves whether or not it would be fair to impose their own sense of justice over that of the community. Dworkin calls this the interpretive approach and, although it may appear to involve a series of choices, he considers that the legal principles underlying the decisions mean that in the end, only one result could possibly surface from any one case. Dworkins approach has been heavily criticised as being unrealistic: opponents believe that judges do not consider principles of justice but take a much more pragmatic approach, looking at the facts of the case, not the principles. Critical legal theorists, like as David Kairys (1998) take a quite different view. They argue that judges have considerable freedom within the doctrine of precedent. Kairys suggests that there is no such thing as legal reasoning in the sense of a logical, neutral method of determining rules and results from what has gone before. He states that judicial decisions are actually based on a complex mixture of social, political, institutional, experiential, and personal factors, and are simply legitimated, or justified, by reference to previous cases. The law provides a wide and conflicting variety of such justifications from which courts pick and choose. The process is not necessarily as cynical as it sounds. Kairys points out that he is not saying that judges actually make the decision and then consider which precedents they can pick to justify it: rather their own eliefs and prejudices naturally lead them to give more weight to precedents which support both views. Nevertheless, for critical legal theorists, all such decisions can be seen as reflecting social and political judgements, rather than objective, purely logical deductions. Critical theory argues that the neutral appearance of so called legal reasoning disguises the true nature of legal decisions which, by the choices made, uphold existing power relations within society, tending to favour, for example, employers over employees, property owners over those without, men over women, and rich, developed countries over poor, undeveloped ones. Griffith (1997) argues that judges make their decisions based on what they see as the public interest, but that their view of this interest is coloured by their background and their position in society. He points out that judgesââ¬â¢ view of public interest assumes that the interests of all the members of society are roughly the same, ignoring the fact that within society, different groups, employers and employees, men and women, rich and poor ââ¬â may have interests which are diametrically opposite. What appears to be acting in public interest will usually mean in the interest of one group over another, and therefore cannot be seen as neutral. Waldron, in his book ââ¬ËThe Lawââ¬â¢ (1989), agrees that judges do make law, and that they are influenced in those instances of law-making by political and ideological considerations, but argues that this is not necessarily a bad thing. He contends that while it would be wrong for judges to be biased towards one side in a case, or to make decisions based on political factors in the hope of promotion, it is unrealistic to expect a judge to be ââ¬Ëa political neuter ââ¬â emasculated of all values and principled commitmentsââ¬â¢. Although judges have traditionally seen themselves as declaring or finding rather than creating law, and frequently state that making law is the prerogative of the parliament, there are several areas in which they clearly do make law. In the first place, historically, a great deal of English law is and always has been case law, made by judicial decisions. Contract and tort law are still largely judge made, and many of the most important developments for example, the development of negligence as a tort have had profound effects. Even though statutes have later been passed in these subjects, and occasionally parliament has attempted to embody whole areas of common law in statutory form, these still embody the original principles created by the judges. Secondly, the application of law, whether case law or statute, to a particular case is not usually an automatic matter. Terminology may be vague or ambiguous, new developments and social life have to be accommodated, and the procedure requires interpretation as well as application. As we have suggested, judicial precedent does not always make a particular decision obvious and obligatory there may be conflicting precedents, their implications may be unclear, and there are ways of getting round a precedent that may otherwise produce an undesirable decision. If it is accepted that Blackstones declaratory theory does not apply in practice, then clearly the judges do make law, rather than explaining the law that is already there. The theories advanced by Kairys, Griffith, and Waldron, all accept that judges do have discretion, and therefore they do to some extent make law. Where precedents do not spell out what should be done in a case before them, judges nevertheless have to make a decision. They cannot simply say that the law is not clear and refer it back to parliament, even though in some cases they point out that the decision before them would be more appropriately decided by those who have been elected to make decisions on changes in the law. This was the case in Airedale NHS Trust v Bland (1993), where the House of Lords considered the fate of Tony Bland, the football supporter left in a coma, after the Hillsborough stadium disaster. The court had to decide whether it was lawful to stop supplying the drugs and artificial feeding that were keeping Bland alive, even though it was known that doing so would mean his death soon afterwards. Several law lords made it plain that they felt that cases raising wholly new moral and social issues; should be decided by the Parliament, the judges role being to apply the principles which society, through the democratic process, adopts, not to impose their standards on society. Nevertheless, the courts had no option but to make the decision one way or another, and they decided that the action was lawful in the circumstances, because it was in the patients best interests. Thirdly, our judges have been left to define their own role, and the role of the courts generally in the political system, more or less as they please. They have, for example, given themselves the power to review decisions of any public body, even when parliament has said those decisions are not to be reviewed. In addition, despite their frequent pronouncements that it is not for them to interfere in parliaments law making role, the judges have made it plain that they will not, unless forced by very explicit wording, interpret statutes as encroaching on common law rights or judge made law. They also control the operation of case law without reference to parliament : an obvious example is that the 1966 practice statement announcing that the HOL would no longer be bound by its own decisions, which made case law more flexible and thereby gave the judges more power, was made on the courts own authority, without needing permission from parliament. The HOL has explained its approach to judicial law-making (which is likely to be the same for the Supreme Court) in the case of C (a minor) v DPP 1995, which raised the issue of childrens liability for crime. The common law defence of doli incapax provided that a D aged between 10 and 14 could be liable for a crime only if the prosecution could prove that the child knew that what he or she did was seriously wrong. On appeal from the magistratesââ¬â¢ court, the divisional court held that the defence was outdated and should no longer exist in law. An appeal was brought before the HOL arguing that the divisional court was bound by precedent and not able to change the law in this way. the HOL agreed and went on to consider whether it should change the law itself (as the 1966 practice statement clearly allowed it to do), but decided that this was not an appropriate case for judicial law making.
Saturday, September 21, 2019
Ipsec implementation
Ipsec implementation There are many methods to IP Security. In the Microsofts Windows 2003 the server version, there are many such techniques and tweaks which are useful to help provide a secure base to the system. The operating system is very good in protecting the system from attacks which may be active attacks or in some cases passive attacks. The procedures for IPSec are placed properly into the system which helps it tackle such attacks. This is possible by providing a secure packet filter for packet transport and also using cryptography. This technology is very in high use for communication types like host to host, router to router, gateway to gateway, site to site and also in virtual private networks. Some other places for successful implementation are secure servers. The IPSec comes as a basic Group Policy controlled by Dos Prompt commands and it also has user interface with custom programs installed. The implementation of IPSec involves these steps: Overview of IPSec Deployment Determining Our Internet Protocol Security targets Preparing a Internet Protocol Security Policy Implementation of the designed policies Overview of IPSec Deployment: There are many techniques such as usage of cryptography and authentication software to secure the communication in a network. The connection may be between two parties or between a group of users. Security is to make sure that the communication is not broken, the communication is not intervened and the data is not altered. The Internet Protocol Security has some features which help running a secure transmission. IPSec has set procedures which help achieve these ends. Today there are many companies and it is getting harder day by day to ensure the security of such humungous networks with a heavy workload on the networks. It is also very hard to track any attacks on the network in millions and millions of request. Using firewalls to protect a network did work for some days but it has proved to be impractical as it has no proper rules to detect intrusions or attacks. The advent of IPSec is a leap in computer and network security. This protocol has a wide spectrum of features which are strong enough to contain such high volume of network requests and also handle intrusions. The Internet Protocol for Security is not a versatile detection protocol. It is capable of managing most of the policies to grant or reject, block and negotiate the traffic in a network. This can also be permitted to a specific set of addresses or in some cases protocol and also a different policy to each port. It is recommended that we use ICF (Internet Connection Firewall) when we are in need of a firewall which is capable of providing a network interface for very big networks. This is because the internet protocol for Security has a very strict and a very stern strategy which is based on static filtering based on IP addresses. But this is it is totally different in the case of the Internet Connection Firewall. The ICF has policies which has a set of filter for all the addresses which are capable of being accessed. The Internet Protocol for Security can be used when the restriction is only to a particular set of addresses or the communication between a group of computers. There are many ways to use IPSec in a network but the best way is bye using a directory with all the domains and also a GP when needed. Some areas of interest when implementing IPSecurity: The decision of where we must secure computers and how on our network which can be done by running a group of systems in a directory which is also called as the Active Directory Organisational Units or OUs. The next step is to determine the strength of the policies we assign. Determining Our Internet Protocol Security targets: The first step in deploying IPSec on our server or the network can be done properly by deciding which set of systems are in dire need of security. There are surely some places on the network which are in a need of higher security than the other sections. It is for sure that IPSec is capable of providing optimal security but the problems starts when the network slows down due to the excessive data to be processed and also a large number of systems for IPSec to follow and maintain. In some cases, there are systems which are not upgraded to be able to support the IPSecurity. Determining Your IPsec Needs In beginning of the protocol design procedure, proper planning should be done to make sure that our current network environment available for use. It is always helpful to have a set of the network topology with all of its hardware and software components. This procedure is of high importance mainly in the designing procedure. IPSecurity is highly vulnerable to a network topology. There are many network topologies in which IPSec is not well suited. Preparing a Internet Protocol Security Policy: As said earlier, there are many network topologies which are not suitable to the default structure of the IPSec policies. There is a need to develop a custom IPSec set of policies well suited for the current network. Some organisations can run their network with a small set of policies. But in companies with a very huge network, there are many policies which are to be implemented properly and also a stringent structure is to be maintained. Steps below shows how IP Sec policies work. Designing IPsec Policies There might be some cases where the company or the organisation is interested in implementing a policy which sets a secure communication between two specified computers. This can be done by restricting all traffic and adding exceptions which relates to these two systems. This method can be done vice versa. A network can be setup with policies to allow all requests and block specific ports or computers. To implement such exceptions, a thorough analysis of the network is clearly needed. Computer roles: Security for Data Transmission: Security needs are different from each and every data packet transmitted. The security policies are also very different. There are many levels in this instance. When considering encryption, there are many types such as AES, DE5, RSA and many more. RSA is the best encryption software available presently. These programs can be used to secure files on transmission, on a network or even in the system. Operating System Computers: IPSecurity is a very unique technique used to implement security in a network. There are many operating systems which are not so advanced to implement IPSec. There is no support for IPSec. But there are many operating systems which are capable of running IPSec in transport mode. Some other cases, the policies are stored locally which makes it easier to decide as the implementation doesnt take long enough. In some cases, IPSec policies are implemented through the Group Policy. General IPSec Policy Settings General IPSec policy settings must be specified whether we want the policy to provide packet filtering or end-to-end networks. IPSec Rules IPSec rules determine which traffic is affected by an IPSec policy and which actions take place when that type of traffic is encountered. Table6.5 describes the contents of IPSec rules that two computers use to establish a secure, authenticated channel. Specifies a named list of filters. Each filter in the filter list specifies the types of traffic to which the filter action is applied. Filters can be defined to match specific IP protocols, source and destination TCP and UDP ports, and source and destination IP addresses. The filter list name might include the version number, the last update time, and the administrative owner. Each computer discards the filter list name during policy processing. Filter action Specifies whether a packet is permitted, blocked, or secured. If packets are to be secured, specifies how they are secured. A list of security methods specifies the security protocol, cryptographic algorithm, and session key regeneration frequency. Request Security Authentication methods One or more authentication methods, which are specified in order of preference. Available options are KerberosV5, certificate, or preshared key. Specifies whether to use tunnel mode and, if so, the tunnels endpoint. Specifies whether the rule applies to LAN connections, remote access connections, or both. Assigning IPSec Policies: As a domain administrator, we can configure IPSec policies to meet the security requirements of a user, group, application, domain, site, or global enterprise from a domain controller. IPSec policy can also be implemented in a non-Windows2000-based domain environment by using local IPSec policies. Deploying Our IPSec Solution: After scoping our needs, building IPSec policies, and determining our strategy for assigning the policies to specific OUs, test the IPSec policies in a lab environment and conduct a pilot project before rolling them out for production use. To ensure that IPSec policy functions as expected and provides the appropriate level of security, test specific IPSec policy configurations on clients and servers in a lab environment, and then conduct pilot or beta tests in a limited operational environment before conducting a full-scale deployment. A Cryptographic Evaluation of IPsec: Even with all the serious critisisms that we have on IPsec, it is probably the best IP security protocol available at the moment. We have looked at other, functionally similar, protocols in the past (including PPTP [SM98, SM99]) in much the same manner as we have looked at IPsec. None of these protocols come anywhere near their target, but the others manage to miss the mark by a wider margin than IPsec. This difference is less significant from a security point of view; there are no points for getting security nearly right. From a marketing point of view, this is important. IPsec is the current best practice, no matter how badly that reects on our ability to create a good security standard. Our main criticism of IPsec is its complexity. IPsec contains too many options and too much exibility; there are often several ways of doing the same or similar things. This is a typical committee efiect. Committees are notorious for adding features, options, and additional exibility to satisfy various factions within the committee. As we all know, this additional complexity and bloat is seriously detrimental to a normal (functional) standard. However, it has a devastating efiect on a security standard. It is instructive to compare this to the approach taken by NIST for the development of AES [NIST97a, NIST97b]. Instead of a committee, NIST organized a contest. Several small groups each created their own proposal, and the process is limited to picking one of them. At the time of writing there has been one stage of elimination, and any one of the five remaining candidates will make a much better standard than any committee could ever have made. The Complexity Trap: Securitys worst enemy is complexity. Complexity of IPsec In our opinion, IPsec is too complex to be secure. The design obviously tries to support many difierent situations with difierent options. We feel very strongly that the resulting system is well beyond the level of complexity that can be analysed or properly implemented with current methodologies. Thus, no IPsec system will achieve the goal of providing a high level of security. IPsec has two modes of operation: transport mode and tunnel mode. There are two protocols: AH and ESP. AH provides authentication, ESP provides authentication, encryption, or both. This creates a lot of extra complexity: two machines that wish to authenticate a packet can use a total of four difierent modes: transport/AH, tunnel/AH, transport/ESP with NULL encryption, and tunnel/ESP with NULL encryption. The difierences between these options, both in functionality and performance, are minor. The documentation also makes it clear that under some circumstances it is envisioned to use two protocols: AH for the authentication and ESP for the encryption. Modes As far as we can determine, the functionality of tunnel mode is a superset of the functionality of transport mode. (From a network point of view, one can view tunnel mode as a special case of transport mode, but from a security point of view this is not the case.) The only advantage that we can see to transport mode is that it results in a somewhat smaller bandwidth overhead. However, the tunnel mode could be extended in a straightforward way with a specialized header-compression scheme that we will explain shortly. This would achieve virtually the same performance as transport mode without introducing an entirely new mode. We therefore recommend that transport mode be eliminated. Recommendation 1 Eliminate transport mode. Without any documented rationale, we do not know why IPsec has two modes. In our opinion it would require a very compelling argument to introduce a second major mode of operation. The extra cost of a second mode (in terms of added complexity and resulting loss of security) is huge, and it certainly should not be introduced without clearly documented reasons. Eliminating transport mode also eliminates the need to separate the machines on the network into the two categories of hosts and security gateways. The main distinction seems to be that security gateways may not use transport mode; without transport mode the distinction is no longer necessary. Protocols The functionality provided by the two protocols overlaps somewhat. AH provides authentication of the payload and the packet header, while ESP provides authentication and confidentiality of the payload. In transport mode, AH provides a stronger authentication than ESP can provide, as it also authenticates the IP header fields. One of the standard modes of operation would seem to be to use both AH and ESP in transport mode. In tunnel mode, ESP provides the same level of authentication (as the payload includes the original IP header), and AH is typically not combined with ESP [KA98c, section 4.5]. (Implementations are not required to support nested tunnels that would allow ESP and AH to both be used in tunnel mode.) One can question why the IP header fields are being authenticated at all. The authentication of the payload proves that it came from someone who knows the proper authentication key. That by itself should provide adequate information. The IP header fields are only used to get the data to the recipient, and should not afiect the interpretation of the packet. There might be a very good reason why the IP header fields need to be authenticated, but until somebody provides that reason the rationale remains unclear to us. The AH protocol [KA98a] authenticates the IP headers of the loour layers. This is a clear violation of the modularization of the protocol stack. It creates all kind of problems, as some header fields change in transit. As a result, the AH protocol needs to be aware of all data formats used at loour layers so that these mutable fields can be avoided. This is a very ugly construction, and one that will create more problems when future extensions to the IP protocol are made that create new fields that the AH protocol is not aware of. Also, as some header fields are not authenticated, the receiving application still cannot rely on the entire packet. To fully understand the authentication provided by AH, an application needs to take into account the same complex IP header parsing rules that AH uses. The complex definition of the functionality that AH provides can easily lead to security-relevant errors. The tunnel/ESP authentication avoids this problem, but uses more bandwidth. The extra bandwidth requirement can be reduced by a simple specialized compression scheme: for some suitably chosen set of IP header fields X, a single bit in the ESP header indicates whether the X fields in the inner IP header are identical to the corresponding fields in the outer header.2 The fields in question are then removed to reduce the payload size. This compression should be applied after computing the authentication but before any encryption. The authentication is thus still computed on the entire original packet. The receiver reconstitutes the original packet using the outer header fields, and verifies the authentication. A suitable choice of the set of header fields X allows tunnel/ESP to achieve virtually the same low message expansion as transport/AH. We conclude that eliminating transport mode allows the elimination of the AH protocol as well, without loss of functionality. We therefore recommend that the AH protocol be eliminated. IPSEC methodology using different operating systems: IPSEC is a framework for security that operates at the Network Layer by extending the IP packet header. This gives it the ability to encrypt any higher layer protocol, including TCP and UDP sessions, so it offers the greatest flexibility of all the existing TCP/IP cryptosystems. While conceptually simple, setting up IPSEC is much more complex that installing SSH, for example. IPSEC also has the disadvantage of requiring operating system support, since most O/S kernels dont allow direct manipulation of IP headers. Linux IPSEC support (the FreeS/WAN project), for example, isnt included in the standard kernel distribution for this reason, and has to be applied as an add-on. Furthermore, putting the cryptography in the kernel isolates it from the application, making it more difficult to code crypto-aware software. Using SSL, for example, simply requires linking a library into the application and allows the application to easily query what certificates have been used to authenticate a client. IPSEC defines a Security Association (SA) as its primitive means of protecting IP packets. An SA is defined by the packets destination IP address and a 32-bit Security Parameter Index (SPI), that functions somewhat like a TCP or UDP port number. SAs can operate in transport mode, where the IPSEC data field begins with upper level packet headers (usually TCP, UDP, or ICMP), or in tunnel mode, where the IPSEC data field begins with an entirely new IP packet header, ala RFC 2003. Furthermore, SAs can be encapsulated within SAs, forming SA bundles, allowing layered IPSEC protection. For example, one SA might protect all traffic through a gateway, while another SA would protect all traffic to a particular host. The packets finally routed across the network would be encapsulated in an SA bundle consisting of both SAs. A common use of IPSEC is the construction of a Virtual Private Network (VPN), where multiple segments of a private network are linked over a public network using encrypted tunnels. This allows applications on the private network to communicate securely without any local cryptographic support, since the VPN routers perform the encryption and decryption. IPSEC is well suited for this environment, more so than tunneling PPP over SSL or SSH, since it operates directly on the IP packets and preserves a one-to-one correspondence between packets inside and outside the network. In the case of tunneling PPP over an encrypted TCP connection, any packet loss in the public network would trigger a TCP retransmission, stalling the link until the packet was delivered. In particular, running Voice Over IP (VoIP) traffic through a TCP/PPP tunnel would largely defeat the RTP protocol used for VoIP; IPSEC is better suited in this case. IPsec Development for Linux: In the Linux IPv4 IPsec world, a lot of people use FreeS/WAN projects implementation. It consists of an inkernel IPsec processing part, Key Exchange daemon Pluto and some utility commands/scripts. To run Pluto with small changes on our IPsec kernel implementation and reduce impact for user who use FreeS/WAN implementation, we have decided to keep compatibility with FreeS/WANs IPsec programming interface between kernel and userland. For this, we use the same PF KEY interface which FreeS/WAN project extended. In kernel IPsec packet processing part, we developed AH, ESP, SAD and SPD from scratch. PF KEY interface PF KEY(v2), which is described in RFC2367, is key management API mainly for IPsec. PF KEY is used for handling the IPsec Security Association Database. Additionally we have to handle the IPsec Security Policy Database, but there is no standard for the IPsec Security Policy management API. In FreeS/WAN implementation, PF KEY interface is extended to manage the IPsec Security Policy Database. Our kernel 2.4 IPsec implementation also uses the same PF KEY interface as FreeS/WANs one. It is important to be able to run the FreeS/WANs userland application (e.g., Pluto) with small changes. Encryption and Authentication algorithm We provide HMAC-SHA1 and HMAC-MD5 for authentication, NULL, DES-CBC, 3DES-CBS and AES for encryption. We thought encryption and authentication algorithm is not only used by IPsec and there are many algorithms so that we consider encryption and authentication algorithm and those interface should have good modularity. We adopted cipher modules which provided by CryptoAPI Project. Security Association and Security Policy SA and SP themselves dont depend substantially on the IP version. FreeS/WAN project architecture depends on their special virtual network interface for IPsec because it might focus on IPv4 tunnel mode (Their implementation also provides IPv4 transport mode). Their SA, SP, SAD and SPD also depend on their special virtual network interface. We considered and decided it was not suit to IPv6 because the IPv6 stack needed the neighbor discovery and the auto address configuration in its basic specification. If we had implemented IPv6 IPsec stack with their architecture, we had to implement those basic specification in their special virtual network interface. Therefore we implemented our own SAD and SPD in order to handle both IPv4 and IPv6. To improve the system performance, Each database will be locked by smallest granularity. And in many cases we use the read lock. SA and SP are managed by the reference counter to prevent used SA from removing by accident. IPsec Packet Processing Output There are various packet output paths from the IP(v4/6) layer to the network driver layer in Linux kernel networking stack (TCP, UDP/ICMP, and NDP[10] for IPv6). The packets which may be applied IPsec will go through these paths. We had to add IPsec functionality for these output paths, e.g, in IPv6 ip6 xmit() for TCP, ip6 build xmit() for UDP/ICMP and ndisc send ns()/ndisc send rs() for neighbor discovery packets. Output process is as follows): check IPsec SP lookup the IPsec SA by the IPsec SP apply IPsec processing to the packet output the packet to the network driver layer To reduce SA searhing time, we link the SP and the found SA after lookup from the first time. Input At input, there is only path for IP packets. We added IPsec processing part in ip6 input finish. Input process is as follows: receive the packet lookup the IPsec SA by SPI(which resides in AH/ESP header) check integrity and decrypt check IPsec Policy. IPsec Tunnel mode We are using IPv6-over-IPv6(and IPv4-over-IPv4) virtual tunnel device to implement IPsec tunnel mode. This implementation can avoid to duplication code of encapsulation/ decapsulation outer IP header compairing with having these code in the IPsec processing part itself. The virtual tunnel device is not different from the normal IP-over-IP virtual tunnel device in Linux. 4 IPsec implementation for kernel 2.6 The most important difference between ours and them is SAD/SPD part. They thought the whole SPD/SAD mechanic should be flow cache based lookup system shared by IPv4 and IPv6. One month later, they introduced the new network architecture called XFRM to Linux kernel 2.5. At first their developing code lacked IPv6 IPsec only for IPv4 IPsec. In order to suport IPv6 IPsec, we have implemented IPv6 IPsec code based on XFRM (and discarded our original code). PF KEY interface The PF KEY interface of Linux kernel 2.6(and 2.5) is compatible with KAME[3] PF KEY interface. We can use setkey command for configuring SA and SP and Racoon for IKE. Additionally we can add IPsec Policy each socket via Netlink3. They have suported only IPv4 in their first code, we have added IPv6 support. Security Association and Security Policy On the XFRM architecture, IPsec SP, which is represented as xfrm policy structure, will be bound to the routing flow cache (and IPsec policy will point IPsec SA bundle) and IPsec SA, which is represented as xfrm state structure, is included in destination cache, dst entry structure. The chaining destination cache means IPsec SA bundle. IPsec Packet Processing Output The output part of the XFRM architecture is placed between the IP layer and the network driver layer. In general, non IPsec packet will be passed to the network driver layer by a single destination output function, which is resolved routing lookup. But IPsec packet will be need to apply some IPsec processing (e.g., encryption, hash). XFRM functions make a chain of destination output functions (We call Stackable Destination, as shown in Figure3). Each function match each IPsec processing (AH, ESP and IPcomp[11]). To be more specific, in order to pass a packet to the network driver layer we have to do as follows. lookup routing table to decide output function by ip6 route output lookup IPsec Security Policy lookup IPsec Security Association(s) suitable for IPsec Security Policy and create destination chain to apply IPsec, pass a packet to the destination chain Input The input part of the XFRM architecture is simpler than output. The XFRM input function is handled as same as upper layer protocols like TCP, UDP, etc. In IPv6, IPsec headers are defined as IPv6 extension header but IPsec input functions are handled as an upper layer protocol handler. As the result of introducing IPv6 IPsec input processing in Linux. kernel, inconsistencies existed between IPsec headers and other IPv6 extension headers. In order to resolve this, we moved to the other IPv6 extension header handler functions to upper layer protocol handler. In detail, we registered IPsec header (both AH and ESP) handler functions with upper layer protocol handler array inet6 protos. Incoming IPsec packet processing flow is as follows: process IP packet from IP header in sequence process IPsec part (check integrity and decrypt) if founded check IPsec Security Policy pass IP packet next handler IPsec Tunnel mode Linux kernel 2.6 IPsec tunnel mode doesnt use the virtual tunnel device to create tunnel. The IPsec stack builds the outer IP header during IPsec processing by itself. IPSec Best practices Best practices IPSEC in transport mode has some serious advantages over other solutions. Compared to other technologies, IPSEC is built into to the Linux kernel. In other words there is nodaemonrunning in the background. Better yet, IPSEC does not require port-forwarding; some people elect to useSSH, stunnel, and other technologies that rely onport forwarding. With IPSEC, you simply have to run a program and its configuration file. After running it,encryptionbetween hosts is mandatory. Connections will be refused if the other connection does not have the appropriate keys. Groups of computers can share the same key, and it can even be done on a per-port setting (for example securing VNC, etc). Downsides? IPSEC in transport mode does have a couple draw backs. In transport mode you cannot have any dynamic setups where the IP addresses change from time to time. In other words, IPSEC is usually insufficient for workstation environments or dynamically assigned networks. Also, if you want to do a per-port setup the configuration becomes harder. Security Implications A very astute user can use IPSEC to bypass firewalls and other security measures. Since IPSEC uses cryptography, information is passed between machines in encrypted format. If the keys are not known, there is no practical way to decrypt the information (it is virtual impossible due to the sheer amount of time it would take). Machine-to-Machine IPSEC installations should be considered as Virtual Private Networks (VPNs) for security considerations. Please check with yoursystem administrator, business policies, and laws and regulations of your locality in order to establish whether or not to institute IPSEC. Requirements ipsec-tools package static IP addresses for each machine Configuration file The configuration file, /etc/setkey.conf, contains the information about the IPSECpolicy. Below is a sampleconfiguration policy(i.e. dont implement this policy because it is insecure). These lines are the actual keys and the encryption that will be used. The first block has the keys that will be used for authentication. In this case, it is the hmac-md5algorithm. The second block contains the keys that will be used for privacy, and the method of encryption. In the example, AES-CBC will be used, which is probably stronger than should be required; the key that we will be using is 194bits, meaning that it is good enough for US Government Secret and below classifications. The final block includes the actual policy. This is where you can put port numbers and even define whether it will be TCP orUDP. Generating the keys The more random the key, the better. Obviously, the example above is insufficient to secure a network. The following command will generate a random key. While running this command, youll need to wiggle the mouse to make it run faster. Or, if you are using a terminal use/dev/urandom instead. dd if=/dev/random count=16 bs=1| xxd -ps Depending on the size of the key that you want, adjust the count (16 will produce a 128 bit key, 24 will produce a 196 bit key, and 32 will produce a 512 bit key) The size of the key is important. If you really paranoid or just haveCPUcycles to
Friday, September 20, 2019
Extensive Reading With Young Learners English Language Essay
Extensive Reading With Young Learners English Language Essay In this essay, I will discuss extensive reading with Young Learners, and how extensive reading can be promoted, with reference to young learners in Hong Kong. Children learn to read in English in schools in Hong Kong at an early age, but there is little encouragement for them to read for purposes other than to learn the language. I will examine the benefits of extensive reading, in particular childrens stories, and how these can be used to promote extensive reading with primary learners in my teaching context at the British Council Hong Kong. Why extensive reading? Day and Bamford (1998, 4) contend that the type of reading done in ESL classes bears little resemblance to reading done in the real world, and that in fact students learning to read a second language do not read and they do not like reading. Reading in the classroom tends to be done purely in order to teach or review a language point, or to train students for an exam. However, It is simplistic but true that the more students read, the better they become at it (Day and Bamford 1998, 4). Teachers therefore need to find ways of encouraging students to read that are enjoyable and motivating for them, and more closely resemble the kind of reading that is done outside the classroom. Extensive reading, is any reading that is done either for pleasure or not explicitly for the purposes of teaching reading. (Emery 2009, 38). This can be any type of text, whether fiction or factual. With this type of reading, the readers attention should be on the meaning, not the language, of the text (Day and Bamford 1998, 5). As children focus on meaning when learning a language, extensive reading should then particularly appeal to them as a way of learning English, especially if the texts are of types that they would normally read in their first language. Language learning from reading comes from exposure to the language, but is not the primary aim of extensive reading. Clark and Rumbold (2006, 9) list the following benefits of reading for pleasure; reading attainment and writing ability text comprehension and grammar breadth of vocabulary positive reading attitudes, which are linked to achievement in reading greater self-confidence as a reader pleasure in reading later in life Although their report was regarding native speaker children in the UK, they note that these benefits are equally true for second language acquisition. It appears, then, that extensive reading is crucial for literacy development. In Hong Kong, there is little interest in reading for pleasure, particularly in English (Ho 2008, Leung 2005). Taking into account the above benefits of reading for pleasure, it seems crucial to encourage a love of reading extensively in our students in Hong Kong, both inside and outside the classroom. Why stories? First and foremost, children enjoy stories. Stories are particularly important in the lives of our children à ¢Ã¢â ¬Ã ¦ Childrens hunger for stories is constant (Wright 1995, 3). If we provide children with stories, they will be motivated to read and listen to them. Reading stories in the classroom is a shared event, which encourages social skills, such as cooperation, collaboration, listening and turn taking and helps to create appropriate affective conditions for learning to take place (Read 2008, 7). We can also provide them with the means to read stories for themselves outside the classroom, increasing their exposure to language further. Children are also aware of and enjoy stories in their first language; From their early experience, children are likely to be familiar with story or narrative structure (Cameron 2001, 129). This means that, unlike many classroom activities, the telling or reading of a story will be a familiar activity. Even if reading books and stories are not commonplace in the home, children will have had exposure to stories through a variety of other media, e.g. films and cartoons. Children are therefore more likely to be receptive to a story than an activity which is not so familiar and therefore potentially confusing. Stories fulfill childrens need for security and novelty (Cameron 2001), as there is the security of the familiar structure of the story, with a beginning, introduction to characters, a problem which is resolved, and an ending, and also the novelty of new stories, characters and plot surprises. Stories provide a clear context from which children can find meaning. The meaning and enjoyment of the story are the most important for children, and the meaning of the language is supported by the context. They work out the meaning first and tend not to pay attention to the words that are used to express the meaning (Moon 2000, 5). Stories are a rich source of language. Because stories are designed to entertain, writers and tellers choose and use words with particular care to keep the audience interested (Cameron 2001, 163). Many words and phrases are often repeated throughout a story, increasing students exposure to them, and also helping to create the sense of security and familiarity. Through such exposure to language children are learning new vocabulary, often without realising it (Cameron 2001, 164), and the teacher can also exploit this vocabulary in classroom activities. Moreover, this vocabulary is used within a clear context, so Children have the ability to grasp meaning even if they dont understand all the words (Ellis and Brewster 2002, 8). Heathfield (2009, 17) refers to his own experience of storytelling with elementary Italian learners, who were able to follow and understand the general meaning of stories told in English. Attention can be paid to vocabulary and students accuracy once the context and meaning have been established. Stories provide children with exposure to not only vocabulary, but also to the structure of sentences and the general feel and sound of the foreign language (Wright 1995, 5). If stories are read aloud, children have exposure to the pronunciation of the language, its rhythm and intonation. This exposure helps them with their fluency, both written and spoken, when they are later ready to move to more productive use of the language. Stories also contain a variety of themes and topics which can be interesting and relevant to the students themselves, or can be exploited in the class. These themes can be linked to other subjects across the curriculum. They can also help develop childrens awareness of the world around them, or of different cultures. Stories can also be used as a stimulus for speaking and writing, and exercise the imagination (Ellis and Brewster 2002, 1). Cameron (2001, 160), warns, however, that we should not allow our feelings of nostalgia and fond memories of childhood stories to colour our perceptions of the magic of stories. She notes that the classroom is not the same as the family home, and the teacher is not a parent, so we should adopt a more critical stance to using stories in class, both in our choices of stories and the way that we use them, and to be open to using other text types which may be equally appealing to children. We should also be aware that stories are also available through other media than books, e.g. animated cartoons or TV programmes, and it is very likely that children may be even more receptive to these forms of media than traditional books. Choosing stories The stories used with children should first of all appeal to them (Phillips, 1993, 46), whether it is the theme, the illustrations, or the fact that it is a story which is familiar to them and they know they will enjoy it. A good story à ¢Ã¢â ¬Ã ¦ is simply one that listeners or readers enjoy (Cameron 2001, 166). The story should have interesting characters that the children can relate to and a clear plot, with possibly a surprise at the end. The length of the text should be appropriate, i.e. for beginning readers using books with shorter texts will promote success and motivation. The language used in the book should also be simple enough for them to understand, but also contain some language which is beyond their current level in order to develop learning and language development. The child should be able to build on familiar language with new language, but not be demotivated by reading something beyond their level. A story which uses a lot of repeated structures and vocabulary will help reinforce meaning, and children also enjoy the repetition. The illustrations used in a book are also important, as they not only make the book more appealing to a child, but can also support the meaning of the text and new vocabulary and stimulate their imagination (Hsiu-Chih 2008). The themes of the story can also help children to understand more about the world, but should have appropriate values and portrayals of characters. If a story is being used in class, one could be used which fits the topic of the lesson. There are many graded readers available for young learners, in which language is carefully selected to match the childs level of English. However, the language is often simplified in these readers to such an extent that the language becomes unnatural, for example present tenses are used throughout, whereas in authentic literature a story is nearly always told using past tenses. As Cameron (2001, 166) comments, It seems a pity to deprive learners of opportunities to hear authentic uses of past tense forms à ¢Ã¢â ¬Ã ¦ I can see no intrinsic reason for supposing that use of the past tense would prevent children understanding a story. Cameron also points out that although many text books for young EFL learners contain stories, they often lack the prototypical features of a story, such as a plot with a a problem to be resolved, and a satisfactory ending. These stories are unlikely to capture childrens imaginations in the same way that stories can do (Cameron 2001, 162). Quality storie s have characters and a plot that engage children, often the art work is as important as the text in telling the story, and they create a strong feeling of satisfaction when the end is reached (Cameron 2001, 166). There are many arguments for providing children learning English as a second language with real books offering a rich source of authentic input and challenge (Ellis and Brewster 2002, 8). These stories are more likely to contain the elements necessary in a quality story as described by Cameron, and children can feel highly motivated by being able to understand a story which has not been simplified. There is also such a wide variety of authentic story books which makes it easier to choose something which will appeal to many different children. Ellis and Brewster (2002, 8) note that it can be argued that the language in authentic story books can be too complex for children learning English, while the content may be too simplistic for their age if a book is chosen which has been written for a younger target age. They argue that In a foreign language, however, children are often very happy to accept stories which they may reject in their mother tongue. Although care needs to be taken to select books which will appeal to the child, what is important is the way that the story is exploited and the language learning supported for the childrens particular level. It is what we expect the children to do which determines the proficiency level required, not the story itself (Wright 1995, 3). It is also important that the child, not just the teacher or parent, chooses the books that they would like to read. Clark and Rumbold (2006, 22) stress the importance of children choosing their own reading material on motivation and acheivement. They refer to Krashen, saying that students who choose what they read à ¢Ã¢â ¬Ã ¦ tend to be more motivated, read more and show greater language and literacy development. Cameron (2001, 164) believes that children may learn vocabulary while listening to stories without realising it, and learner involvement with a story may be what makes a difference à ¢Ã¢â ¬Ã ¦ letting children choose the stories they want to hear may help maximise the learning that takes place. They will be more likely to choose books that interest them, and therefore be more motivated to understand and engage with the text. It is difficult to place too much emphasis on the role interesting material plays in the desire to read (Day and Bamford 1998, 29). Using stories and promoting extensive reading There are many ways in which extensive reading and reading stories can be promoted both inside and outside of the classroom, which I will discuss in relation to my current teaching context. In the classroom, the teacher can use stories in a variety of ways, both to promote reading and to exploit stories for further language work. Reading stories aloud to the class is an effective way of exposing children to story books and their narrative structure. From listening and watching an adult read aloud, children can see how texts are handled, how texts encode words and ideas, how words and sentences are set out on a page à ¢Ã¢â ¬Ã ¦ Affectively, reading aloud can motivate children to want to read themselves (Cameron 2001, 141). The telling of the story should be an enjoyable experience, and, if possible, the classroom arranged so that all children are sitting around the teacher, maybe on the floor, so that everyone can see the book (Wright 1995). The teacher should take care to hold the book so everyone in the class can see it, and use mime, gestures, facial expressions, the stress and intonation of their voice, and the pictures in the book, to help students understanding (Ellis and Brewster 2002, Read 2008). Students should be encouraged to participate in the story reading through questions which reinforce understanding, e.g. describing the pictures, or making predictions about what happens next. The teacher can help students with new and difficult vocabulary by providing tasks to pre-teach vocabulary, and follow up with activities which consolidate the language and help students to recall the story. Above all, the story and related activities should be enjoyable for the students. Favorable feelings for and experiences with the teacher, classmates, materials, tasks, procedures, and so on, can forge positive attitudes toward reading in the second language (Day and Bamford 1998, 25). At the British Council Hong Kong literacy texts have been incorporated into the syllabuses for the higher level primary classes for students aged 8 and above. These are generally texts which are used in schools in the UK to teach literacy in the British National Curriculum, with accompanying teachers notes and materials these are usually adapted to suit the EFL and local contexts. The texts chosen are for a younger age group than they would be in the UK, i.e. materials for British children aged 8 to 9 are used in classes for Hong Kong learners aged 10 to 11. These have proved to be overwhelmingly popular with teachers, who report that they enjoy using them and find that students also enjoy the stories whilst being stretched, because they can see that the materials are authentic and feel a sense of achievement. Many teachers also use storytelling in class, as story books are readily available in Hong Kong. These teachers appreciate the value of using story books in class, and find storytelling an enjoyable activity in class themselves. Some teachers use story books not just for teaching purposes, e.g. the introduction/consolidation of language or to complement the course book materials, but also for a story time slot. Often at the end of the lesson, the story time slot is used as part of the classroom routine and settles children. The stories are read purely for enjoyment, and if enough books are available (some teachers have their own story book collection) students are able to choose which stories they would like to hear. For younger primary students book boxes are provided with a selection of suitable books, which teachers are encouraged to use with their classes. One advantage of the book boxes is that with a selection of books children are able to choose for themselves what the would like to read, or what they would like the teacher to read. Other ways of encouraging children to choose and read books would be to have a book corner in the classroom or a lending library for children, so that children could enjoy reading by themselves either in class or at home. Unfortunately, neither of these are currently feasible at British Council Hong Kong. The classrooms are used by many different classes, including adults, so it would not be practical to set up a corner of the classroom with books. There is also the issue of funding book corners or a library; with approximately 3,500 primary students currently taking courses at the British Council, the cost of buying sufficient books for either scheme is prohib itive. One scheme which has been successfully introduced for primary classes is a Reading Challenge. Students are encouraged to read books in English and write brief reviews of them. After they have read six they receive a prize of a certificate and a book. The success of the scheme seems to depend largely on how much the individual teacher promotes it, but prizes have been earned by students across a range of classes, not only in the highest levels or older age groups. Clark and Rumbold (2006, 20), in a review of studies examining the effect of reward on motivation, conclude that we cannot be certain that rewarding children for reading actually motivates them to read more, or if they do so, that they are reading purely to get a prize and will not continue to read widely in the future. However, if a reward is given for reading, it appears that literacy-targeted rewards, such as books or book vouchers, are more effective in developing reading motivation than rewards that are unrelated to the activity. The most important factor, however, in developing childrens literacy and enjoyment of reading is the involvement of their parents (Clark 2007, Clark and Rumbold 2006, 24, Wood 1998, 220). The British Council Hong Kong has recently introduced parent workshops to encourage parents to read with their children, emphasising the importance of reading not only for literacy and educational attainment but also social and emotional development. Parents are also shown how to choose appropriate books and how to read them with their children, exploiting the stories and the pictures. These workshops are proving to be very popular with parents, who, while keen to encourage their children academically, had previously not realised the benefits of reading for pleasure. Conclusion There is not on the whole a culture of reading in Hong Kong, but, given the advantages outlined of extensive reading, it is particularly important to encourage our students to read for pleasure, and using story books can be particularly effective. This requires not only access to suitable texts, but also training for teachers and parents on how to read books with children and develop further language use. (3,204 words)
Subscribe to:
Comments (Atom)