Thursday, October 31, 2019

Ethics - Abu Ghraib Essay Example | Topics and Well Written Essays - 2750 words

Ethics - Abu Ghraib - Essay Example military officials and other parties who are directly and indirectly involve in the Abu Ghraib case. Despite the unethical treatment over the Abu Ghraib detainees, the U.S. court of justice is left with no other choice but to grant absolute immunity over the accused individuals. In relation to the controversial issues between ethics and legal processes in the Abu Ghraib case, the conflicting issues between the U.S. military chain of command and the executive power vested on the U.S. president in ruling the U.S. military group of army will be tackled in details. Going through this study will enable the readers have a better understanding why it is difficult to legally punish people who are behind the physical, mental, and sexual abuse on detainees. In this study, a summary of the Abu Ghraib prison scandal will first be described followed by tackling issues regarding the legal and ethical issues behind the Abu Ghraib prison scandal. Eventually, things that I would have done if I am in Abu Ghraib including the rationale and ethical concerns behind my perceived actions will be provided in details. Physical evidences composed of 279 photos and 19 related videos revealed that the Abu Ghraib prison scandal is a serious case which involves cruel physical and psychological abuse such as torture, sodomy, and homicide on prisoners (Benjamin 2009; Scherer and Benjamin 2006). Sexual abuse and humiliation such as forcing the prisoners to masturbate in public or walk around the correctional facility of Baghdad in Iraq naked were seen on photos and videos gathered by the Army’s Criminal Investigation Division (CID) (Benjamin 2009; Hersh 2007). Several reports revealed that the Abu Ghraib prison scandal was committed by the U.S. military personnel together with other government agencies (OGA) who is in-charge of conducting an independent military chain of command (Benjamin

Tuesday, October 29, 2019

Richman Investments Essay Example for Free

Richman Investments Essay Overview To stop malware problems from occurring at Richman Investments Protecting Richman investments employees, partners and company from illegal or damaging actions by individuals either knowingly or unknowingly Internet /intranet/ extranet related systems including but not limited to computer equipment, software, operating systems, storage media, network accounts providing electronic mail, www browsing, and FTP, are the property of Richman investments. These systems are to be used for business purposes in serving the interests of the company and of our clients and customers in the course of normal operations Purpose The purpose of this policy is to mitigate the improper use of company computer asset these rules are in place to protect the employee and Richman investments. Inappropriate use exposes Richman investments to risks including virus attacks, compromise of network systems and services, and legal issues. Scope I would like to implement a new AUP policy to stop these problems from occurring they need to design an AUP to let user know what they can or can’t do on the system. And use the IT department to restrict access to removable devices. Policy 1.While Richman investments network administration desires to provide a reasonable level of privacy, users should be aware that the data they create on the corporate systems remains the property of Richman investments. Because of the need to protect Richman investments network, management cannot guarantee the confidentiality of information stored on any network device belonging to Richman investments. 2.Employees are responsible for creating guidelines concerning personal use of Internet/Intranet/Extranet systems. In the absence of such policies, employees should be guided by departmental policies on personal use and if there is any uncertainty, employees should consult their supervisor or manager. 3.For security and network maintenance purposes, authorized individuals within Richman investments may monitor equipment systems and network traffic at any time. 4.Richman investments reserve the right to audit networks and systems on a  periodic basis to ensure compliance with this poli cy. Security and Proprietary Information 1.The user interface for information contained on internet/intranet/Extranet related systems should be classified as either confidential or not confidential, as defined by corporate confidentiality guidelines details of which can be found in the HR policies. Examples of confidential information include but are not limited to company private, corporate strategies, competitor sensitive, trade secrets specifications, customer lists, and research data. Employees should take all necessary steps to prevent unauthorized access to this information. 2.Keep passwords secure and do not share accounts. Authorized users are responsible for the security of their passwords and accounts. System level passwords should be changed quarterly; user level passwords should be changed every six months. 3.All PCs, laptops and workstations should be secured with a password protected screensaver with the automatic activation feature set at 10 minutes or less or by logging off when the host will be unattended. 4.Use encryption of information in compliance with acceptable encryption n use policy 5.Postings by employees from a Richman investments email address to new groups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of Richman investments unless posting is in the course of business duties. 6.All host used by the employee that are connected to the Richman investments , Internet/Intranet/Extranet, whether owned by the employee or Richman investments shall be continually executing approved virus scanning software with a current virus database unless overridden by departmental or group policy. 7.Employees must use extreme caution when opening email attachments received from unknown senders which may contain viruses, email bombs, or Trojan horse code. Unacceptable use The following activities are in general prohibited. Employees may be exempted from these restrictions during the course of their legitimate job responsibilities system administration staff may have a need to disable the network access of a host if that host is disrupting production services. Under no circumstances is an employee of Richman investments authorized to  engage in any activity that is illegal under local, state, federal or international law while utilizing Richman investments owned resources. Email and communications activities 1.Sending unsolicited email messages including the sending of junk mail or other advertising material to individuals who did not specifically request such material email spam. 2.Any form of harassment via email, telephone or paging whether through language, frequency or size messages. 3.Unauthorized use or forging of email header information. 4.Solicitation of email for any other email address other than that of the poster’s account with the intent to harass or collect replies. Enforcement  Any employee found to have violated this policy may be subject to disciplinary action up to and including termination of employment

Sunday, October 27, 2019

Which factors contribute to young people committing crime?

Which factors contribute to young people committing crime? Which factors contribute to young people committing crime? Introduction I chose this topic for my literature review as I feel that if we understand the root of the problem of the crime, in this case the risk factors that lead to criminal activity, then juvenile delinquency could be understoodand possibly prevented. A risk factor is ‘some specific characteristic displayed by a person or their circumstances that bears some statistically significant correlative position in relation to their behaviour† (Brown, 2005). Home Office statistics for 2009/10 show that young people age 10-17 were responsible for 20% of all the crime recorded by the police. (Cooper and Roe, 2012). Due to the high number of crime committed by youth, even though they are mostly minor crimes, is it important to understand what leads them to committing criminal acts. Numerous researchers have come up with theories and reasons which try to explain why young people choose to commit deviant acts. The following studies found in this literature review will attempt to explain some of the factors that contribute to young people committing crime. Methodology For this literature review I have used a variety of sources which will provide me with both qualitative and quantitate data. I researched studies from journal articles, government reports and afters going to the library I managed to find many books on the topic of factors contributing to juvenile delinquency. I also managed to find a few websites that provided me with background information and statistics. Findings A number of researchers categorise ‘risk’ factors in many different ways. In this essay however I will mostly talk about individual, social/family and environmental factors. Each of this category has its own subcategories. For example, under the category of social factors it can be included family risks, peer-related risks, etc. Environmental Risk Factors Several research articles I looked at suggests that one of the reasons why youth choose to commit criminal acts is because of poverty. A study was conducted at the Kamiti Youth Corrective Training centre (Y.C.T.C) where the sample were 55 inmates selected by random sampling from a total of 120 inmates. It was found that over 70% of the sample were poor or came from families with poor background. This was based on where they lived, whether or not they owned properties and the types of crimes they committed, For example, some of the inmates stated that because they lacked their basic needs, they run from home into the streets to beg for survival. They stated that they also became involved in petty offences like stealing good or properties values that were not too expensive. This finding showing that poverty is a cause of crime among youth, supports the theory of Thomas R. Forstenzer, in one of his articles called â€Å"Tomorrow in North America: Youth between the American dream and re ality†, in The Twentieth Session UNESCO General Conference Report titled â€Å"Youth in the 1980S â€Å" on poverty as a main reason of deviant acts. He states that economic stress and believing in personal failure is â€Å"†¦the chronic culprit for the symptoms of social decay: drugs, alcohol and sex related problems that will affect the young as long as the family itself difficulty facing the strains of inflation and unemployment†. (Omboto et al., 2013) As poverty is linked with social class, more than 80% of the sample from the Y.C.T.C. study belonged to lower social class. Before their arrests a majority of them lived in poor areas around Nairobi city such as Kibera and Mathare. The researcher stated that some of these offences were bare footed. This finding on social class and delinquency confirms the opinion of Wright and Younts (2009) that delinquency rate increased while social class decreased. Social Risk Factors Other researchers believe that some youth get into crime as a form of rebellion against parental authority and due to peer pressure. Youth people may choose to commit crimes as a way to show their independence of the ‘adult’ word and its rules, as a way of getting attention and respect from peers, as well as trying to compensate for their restricted opportunities at school or in their community. By having good relationships with parents during childhood might help in a fortunate transition to adolescence, but it does not guarantee it, as risk factors are linked together. For instance, even though one might have an outstanding relationship with the parents, they might come from a low social status, and therefore it might led them to commit crimes. Hirschi (1969) argues that â€Å"delinquent acts result when an individual’s bond to society is weak or broken. He states that conformity starts from four types of social control which then these create social bonds. The weaker those bonds are the most likely it is for someone to commit a deviant act. For example attachment is one type of social control. Strong social attachments leads to conformity, and by having a fragile family/peer/school relationship, can make people to commit crimes more easily. (Hirschi 1969 cited in Carrabine E. et al.) Ojo (2012) states that broken homes and low education attainment as some of the causes for youth committing deviant acts. In the Y.C.T.C. study, most of boys from the sample came from dysfunctional families. Some of the boys were orphans and had no guardian to look after them before their arrest, other boys has divorced parents or a single parents and others’ parents were alcoholics or were not able to give a ‘good’ parenthood. For instance, in the sample7 boys had divorced parents, 6 youths mothers died, 14 has no father (either died or unknown), while 8 had no parents at all. When it comes to education, 78% did not go beyond class six primary with their schooling. (Omboto et al., 2013) West Farmington (1973) stated that just like low income family income, large family members is also an important factor of youth offending. This is due to the presence of several siblings that leads to faulty upbringing by parents/guardians at critical stages of the child’s development. Individual Risk Factors Other studies have found that individual risk factors also play a role in the behaviour of the youth. Individual factors include factors such as impulsivity, attention problems, low intelligence and low school attainment. For instance. LeMarquand and Tremblay (2001) cited in OJJDP’s argued that â€Å"the best social behaviour characteristic to predict delinquent behaviour before age 13 appears to be aggression†. Hawkins at al. (1998) cited in OJJDP’s also found ‘a positive relationship between hyperactivity, concentration and attention problems, impulsivity and risk taking ad later violent behaviour’ Herrenkohl et al (2001) cited in OJJDP’s stated that â€Å"children with low academic performance, low commitment to school, and low educational aspirations during elementary and middle school grades are at higher risk for child delinquency than are other children† Otherl Risk Factors Other risk factors found in the literature which might influence a young person’s behaviour can be community and neighbourhood. Young people who live in a neighbourhood with a high level of poverty and crimes, is likely to increase the risk of young people being involved in a serious type of offence.( McCord, Widom and Crowell 2001 cited in OJJDP’s). Prevention strategies which can help to lessen the risk factors Richards (2011) believes that taking away the youth form their areas and putting them behind the bars, does not deal with the underlying problem. Therefore some measure should be put in place to help reduce young people involvement in crime. For example the government and private agencies should creaser employment opportunities for youth of employable ages. Parents must also be responsible for their own children (providing moral guidance and material needs). But also learning institutions for youth must put in place sport and extra-curriculum activities, as this will leave them less time, if no time at all to be preoccupied with other things like offences Conclusion From summarising the studies, I have identified 3 main risk factors that can have an impact on young people’s involvement in crime: Social, individual and environmental risk factors. I have also identifies other risk factors which are not too important but it does have some relevance to young people’s behaviour. I have also identified some prevention strategies which might help to young people to stop getting involved in criminal activities. Overall, whether is down to individual, social or environmental factors, young people’s involvement in crimes sees to decrease since 1995. But we cannot say crimes declined due to the improvement of one factor (i.e. social factors) because as I discussed earlier, risk factors are connected with one another. Even though risk factors give us an understanding to why young people might choose to commit crimes, risk factor approach has its limitations. One of them being the risk of being labelled, young people being generalised and it also fails to distinguish correlation form causation. Preventing the delinquents is a big problem with no easy and quick solutions. Risk factors only offers the possibility to establish which youth is more likely to commit deviant acts. If I was to do further research on this topic, I would try to find more research based in the United Kingdom as most of the research I found was from America, however the short time prevented me from doing so. Reference Brown, S. (2005). Understanding youth and crime. 2nd ed. London: Open University Press, p.100. Carrabine, E., Cox, P., Lee, M., Plummer, K. and South, N. (2009). Criminology. A Sociological intrdouction. 2nd ed. New York: Routledge, p.83. Cooper, C. and Roe, S. (2012). An estimate of youth crime in England and Wales: Police recorded crime committed by young people in 2009/10. 1st ed. [ebook] London: Crown. Available at: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/167982/horr64.pdf [Accessed 2 Nov. 2014]. Ojo, M.O.D. (2012) A Sociological Review of Issues on Juvenile Delinquency The Journal of International Social Research Volume: 5 Issue: 22 465-482 Omboto, J., Ondiek, G., Odera, O. and Ayugi, M. (2013). Factors influencing youth crimes and juvenile delinquency. International Journal of Research in Social Sciences, [online] 1(2), pp.18-20. Available at: http://www.ijsk.org/uploads/3/1/1/7/3117743/sociology_2.pdf [Accessed 3 Nov. 2014]. Richards, K. (2011). What makes juvenile offenders different from adult offenders?. [online] www.aic.gov.au. Available at: http://www.aic.gov.au/media_library/publications/tandi_pdf/tandi409.pdf [Accessed 3 Nov. 2014]. West D.J. and Farmington D.P. (1973) â€Å"Who becomes Delinquents† Second report of the Cambridge Study in Delinquent. London: Heinemann Wright, B.R.E. Younts, C.W. (2009) Reconstructing the Relationship between Race and Crime: Positive and Negative Predictors of Crime among African American Youth Journal of Research in Crime and Delinquency 2009 46:327 The iPremier Co.: Denial of Service Attack The iPremier Co.: Denial of Service Attack Wk3AssgnCannadyE The iPremier Co.: Denial of Service Attack. On January 12, 2007, iPremier Web servers were brought to a halt after a denial-of-service (DoS) attack had occurred. (https://services.hbsp.harvard.edu/services/proxy/content/55482727/55482733/bc0bf879de2a3b14574a611f54ec52c6). (ADOS attack) is where a multiple of compromised systems, which maybe infected with a Trojan virus, are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack. (http://www.ddosprotection.com/about/ddos-information/) How well did the iPremier Company perform during the 75-minute attack? In what ways were the companys operating procedures deficient in responding to this attack? In what ways were they adequate? What additional procedures might have been in place to better handle the attack? In my opinion, Qdata and iPremier really dropped the ball on this by not thinking steps ahead. They did not have a contingency plan or any plan of sort for this worst case scenario. iPremeir had placed too much faith into Qdata`s ability to handle the situation or threat. The first thing I noticed the company did was panic, since there was no crisis strategy/disaster plan. The attack couldnt have happened at the worse time since the attack happened during a high traffic period. If this attack was done by competitors than they got what they were looking for by hurting the reputation of the company. If I was Bob Turley, I may be worried if Im still going to have a position still, since I was not prepared for this infrastructure break. Bob did not go over all known threats to the infrastructure risk matrix and develop procedures to immediately identify the type and risk. These threats would need to be continually assessed as new ones emerge and the identification would have helped deter mined the right procedures for defending against them. My first move I wouldve of made is open a line of communication with Qdata to discuss any risk measure we may have to take. I would not have let the attack go on for so long without pulling the plug to our servers so the customer information cannot be stolen. I would also increase my security against attackers. Having system and users use stronger encryption passwords. Have better real-time monitoring, with a backup plan that has went through testing. Train my employees to better understand the type of attacks and train them on how to handle emergency situations. Even after that make another business continuity plan and test it end to end than repeat. Keep all the software up to date that will better protect from viruses and attacks. You may want to hire an outside audit team to keep a check and balance. The biggest problem is the host provider. If I was Bob, I may want to build a much better relationship with my provider, showing the importance of this never happening again. Since in sense its my companys reputation which is on the line. If that dont work, I would go get a more reliable/reputable host provider. With a high class support and infrastructure, with better security measures. Besides of the updating I would do to the software, Firewalls would also need to up dated. This will protect my company from viruses and also protect from the whatever employee. Again training my employees on what not to do is really important. Train them on emails and what type of emails are at risk. Tell them to always inform somebody on any obscene gestures they computer may be exhibiting. Especially any ha emails. In the aftermath of the attack, what actions would you recommend? My biggest concerns are Legal, Public Relations, Stock Prices, Customer Information and Network Security as least important after the attack. The attack just proved to any competition that my firewalls can be hacked. In looking who could be the one responsible. I would be looking at my competition and what would they have to gain in my attack. Since in sense if I pulled the plug than it would take at least 24 hours to get back running. Even if I did not pull the plug and I rode the attack out than I would still have to shut down business because of then security breach. No matter which route taken, I would still be at lost once my firewalls proved to be vulnerable. There a lot of equations to look at. This is the main reason I would have an outside Network Operations Center (NOC). They will provide all the monitoring I may need for any issue that may arrive even the increase of bandwidth References: http://www.ddosprotection.com/about/ddos-information/ https://services.hbsp.harvard.edu/services/proxy/content/55482727/55482733/bc0bf879de2a3b14574a611f54ec52c6

Friday, October 25, 2019

Victims of Domestic Abuse :: Legal Issues, Politics, Social Issues

Currently, protective orders are only provided during regular court hours to victims of domestic abuse. However, the occurrence of violence has no time frame – it does not only take place or transpire on a nine to five time clock. Therefore, I propose that legislation should be pushed forward which allows District commissioners the authority to put temporary restraining orders on people accused of domestic violence. It is important to note that victims may not receive full protection until the existing false impressions, held by some judicial and public safety officials, about the proper issuance and enforcement of protective orders are rejected. It is often considered that a protective order, being a civil order, should not be handled or enforced by police. This type of power should not be distributed, uncontrollably, to police officers. Since a court issues a protective order, some mistakenly believe that the police should not be able to arrest a person who violates the protective order because the person is in contempt of court – not disobeying the law. The proposed legislation would destroy these misconceptions by changing the state constitution to allow District commissioners to not only grant protective orders but also at night and on the weekends to safeguard â€Å"victims† of domestic abuse. Domestic violence is defined as threatened or actual abuse from someone in the victim’s immediate family or in his/her home or with whom she/he has a close relationship. Temporary restraining orders are issued by a court to restrict the conduct of a person while providing a victim with protection from the activities of an abusive person.

Thursday, October 24, 2019

Official Winter Break Essay

However, even though Columbus did not discover the Americas first, European Exploration still had a ore immense impact within their world and our modern world today. One of the major reasons the European Exploration turned out to have a much bigger impact in history' than any other exploration is due to the formation Of the European Exchange. Thanks to the exchange many goods had been traded and thus the creation of many foodstuff as well as other materials such as tobacco and crops. The European Exchange is one of the major reasons that the European Exploration is recognized above all other explorations.The trade between these countries lead to many others to come o Europe for valuable resources and Europe began to expand and grow, not only due to the newly conquered land, but to the new people that were coming for the resources. I believe that this is because of how large this was on the scale and the explorers prior to the Europeans never made a big deal rather they just kept movi ng on and missed an opportune chance. European Exploration also overshadows the other explorations as the fact that they were more ruthless and willing to do anything in their power to expand their religion, obtain more gold, and be glorified for their actions.Their actions lead to them to enslave and slay the natives of the New World whether by accident (disease). Their sheer numbers had overwhelmed many places that they conquered and changed the society of the people around them. Native Americans turned into Catholics and lived the same way as the Europeans. Other countries, such as China, used Ghent Hajj was took on more of a peaceful approach yet not to an extent. China used the tribute system which enforced their power on the land nearby, whereas Vocal De Gamma, aEuropean explorer, enslaved and killed hundreds to capture ports for Portugal to trade. Their ways were very much similar, however Europeans were more ruthless and quicker and thus their influence was more massive and swifter which is why their influence is still active today. Rupee's strength was not solely the reason why its influence was so solid- some states like.

Tuesday, October 22, 2019

High School and College Life

There are many students who attended college an it changed them both physically and mentally. I am one of those students. Since I began college it started to change me into a better person on many occasions. I have learned to become more responsible, and get the work done. In addition I have to change my attitude or else I will fail my courses; for example my classmate start skipping classes and misbehaves with the professor, which lead him to fail the course.Moving from high school to college is a huge step in everyone’s life. If you don't change your lifestyle for the better reason then you might not reach your goal in college. Once you reach college it’s the time that you start being an adult. The college life has changed me for the better. I am much more responsible in many different ways. I had to change my study habits, or, should I say, I had to get engaged in study habits. In high school I never studied because everything came so easy to me and I could just do t he work, even end up with passing grades.When I reached college I tried to do the same thing and it didn't work. I had to start studying on a daily basis and it was hard for a student like me to change from not doing any work to studying every night and also on the weekends. I wasn't used to doing it at the beginning, but I had to make it a habit or I was not going to reach my goal. Since I began attending college it made me more responsible to make the right decisions. In college you have to make decisions that are very hard.Pressure comes in hard when you get to college; for example you could have a test that you need to study for and there is a party that you want to go to. If you do go to the party then you will fail the test because you did not have any time to study. This is just one example, and there are many more. Another reason that college is a big step is because you are on your own, and you don't have anybody to tell you what to do. Before, in middle and high, school pa rents wake you up to go to school, but when you are in ollege you get up early in the morning to go to class by yourself. College is a life-changing experience for me. I never felt stress in my entire life as I feel as now in college . College is a big source of stress for a variety of reasons, and poor planning often leads to crisis situations. The stress of everyday life in college shows itself in different ways: the expectations of making an A in every course, the fear of doing poorly on tests, and getting worried or nervous over the work.However, it made me realize that you have to go through stress in order to reach you goal because stress is a way of living. College is the most important decision I ever made in my life. It made me realize that without education you won’t be successful. Since I began attending college, it showed me that how life is fast and short you have to be something or else you will feel miserable. The courses in the college are quite stressful for every student, but this is to make us focus and have motive in our work. Attending college also showed me that reality is not like a fairy tale.