Tuesday, December 31, 2019

Rape As A Weapon Of Warfare And Civil Conflicts - 1802 Words

The use of sexual violence as a weapon in warfare and civil conflicts has been around for centuries, from the Crusades to the World Wars and to this day, rape is still a tactic used in warfare and conflicts. This essay explains why rape is such a popular tactic, it’s prevalence from early times to today and the cultural, social, economic and political factors that come to play in regards to rape in warfare. The culture of militarism comes into full effect when talking about warfare. Rape is a tactic used by the military to ensure their power and control. It is to show that they have the masculine privilege by showing their strength and dominance over the women. (Chinkin, 1995) In a patriarchal culture, and in a military culture that is dominated by men, war provides the perfect psychological backdrop for men and even an excuse to show their distain towards women. In military culture, the weapons are in the hands, or dare I say, between their legs, and this, along with orders given and the soldier’s need to follow the orders to the highest extent give the soldiers a sense of dominance. The spiritual bonding of soldiers, along with the sense of dominance, confirms to men that women are secondary, and that they are of nothing and are just spectators in the world of action. (Brownmiller, 1975, p. 45) Thus explains why rape is such a popular military tactic during wars. It emphasizes on power and humiliation of the weak, hence why the rape is always targeted towards the womenShow MoreRelatedThe Rise Of The Arab Spring1555 Words   |  7 Pagesdemonstrations, riots, and civil wars in the Middle East that began on 18 December 2010, pro-democracy Syrians rose in rebellion to the existing regime of Bashar al-Assad, Syria’s president. Assad’s regime brutally fought back and with the escalation in violence, Syria descended into a civil war, with each side scrambling for control over towns and cities (Rodgers). The Syrian government has committed several war crimes such as torture, rape, murder and the use of chemical weapons, which led to the deathRead MoreThe Relationship Between Gender, Conflict and Violence Essay2443 Words   |  10 PagesThe relationship between gender, conflict and violence is a particular issue that hits home to me having spent six months last year working in Iraq with a local NGO and UNHCR working with incoming Syrian Refugees a nd in particular undertaking project development for Combatting sexual and gender based violence (GBV) within Iraqi Kurdistan. The effects of conflict on women, and violence being imposed on women within conflict zones is one that needs to be discussed, promulgated, advocated for and addressedRead MoreThe Nineteen Hundred Years2196 Words   |  9 Pagesand in fact never before needed, a direct consequence of war. During this term we’ve looked at many wars, beginning with the Italian conflicts of 1494, and progressing all the way to the current day war in Syria and Iraq, and the one thing that has changed and shifted the most in these five hundred years is how wars are fought, and most importantly limited warfare. All wars no matter how small or large, have had a watershed impact on the current way we fight and limit wars in the current day. AsRead More Roots of the Rwandan Genocide1739 Words   |  7 PagesOn April 6, 1994, Rwanda experienced a period of great turmoil as thousands of people fell victim to the horrors of the Rwandan genocide. The main targets of the genocide were Tutsis and Hutu moderates. Though the main cause of the genocide was a conflict between two ethnicities, the genocide was also fueled by political factors and social conditions. Rwanda is the smallest sub-Saharan country with a population of about 7 million inhabitants. Although the indigenous peoples of Rwanda are the Twa,Read MoreCarl Von Clausewitz s War And Strategy1543 Words   |  7 Pagesadequate for explaining warfare in the modern era. The paper will introduce Clausewitz’s very systematic approach to the subject of war and will prove how useful it remains for formulating a definition of war that is able to conceptualize the many different forms of modern war. To achieve this task, the definitions â€Å"war is more than a chameleon† and â€Å"the wondrous trinity†, come to demonstrate that the theories of Carl Von Clausewitz are still adequate for explaining warfare in the modern era. ApartRead MoreThe Atomic Bomb Of Hiroshima And Nagasaki1445 Words   |  6 PagesAmerican dominance over the Soviet Union. Finally, the atomic bombings were an effective and justified way to end WW2 and force Japan surrender In 1937 when the Japanese army took over the Chinese city of Nanking they demonstrated barbaric forms of rape, torture, and murder towards Chinese civilians; which justifies the American retribution for firing the atomic bombs on Japan. Moreover, the Japanese people got quick and painless deaths from the atomic bombs whereas the people of Nanking sufferedRead MoreHow Useful Is The Concept Of New Wars When Analysing Contemporary Warfare?2353 Words   |  10 PagesHow useful is the concept of ‘New Wars’ when analysing contemporary warfare? INTRODUCTION Traditionally, according to Clausewitzean school of thought, war is considered to be â€Å"an act of violence intended to compel our opponent to fulfil our will†. These traditional wars, also known as â€Å"Old Wars† are generally characteristically financed by states and occur between states as a means to achieve states interests by using regular national armed forces which generally have a discernable vertical structureRead MoreThe Fundamental Premises Of Realism And The Peace Through Strength Theory1104 Words   |  5 PagesName: Kelsey O’Connor Instructor: Barbara Wien Mid-TERM EXAM Peace, Global Security and Conflict Resolution SIS-210, Fall 2016 VERY short answers please. Some only require a few words. Others are more complicated. 1. What are the fundamental premises of Realism and the peace through strength theory? The fundamental premises of realism consist of the five basic tenants of state craft and core assumptions of realism which comesRead MoreThe Human Nature Of Violence Essay2582 Words   |  11 Pagesbombarded with stories and images of gory foreign civil war, violent extremists, and threats of terrorism. Yet, despite the current state of our world, studies from Steven Pinker, in The Better Nature of Our Angels, have shown that violence has been on the decline since the end of the last world war. This is due to the four trends, the Long Peace, The New Peace, The Right’s Revolutions, and our Inner Demons, that have led to an overall decrease in warfare, genocide, and terrorism. Along with cited studiesRead MoreSierra Leone : Corrupt From Blood Diamonds1334 Words   |  6 Pageshave erupted to the scene as a major problem in the African nation known as Sierra Leone, causing the major issue of government corruption. Ever science Siaka Stevens inflicted the type of government that would allow for such a resource to become a weapon, diamonds became the most sought out product in all of North-western Africa. The reason why blood diamonds have stuck around and isn’t just a quick boost in the economic flow of money is because it forms an evident and vicious cycle, along with the

Monday, December 23, 2019

The Themes Of Betrayal In Flight, By Sherman Alexie

Betrayal hits the most not when by a friend, but by a loved one. In the novel, Flight, by Sherman Alexie, a half Native-American half Irish teen calling himself Zits, struggles with moving from abusive foster home to the next while in the constant search for a real family, real parents. In the act of crime, Zits is shot which transports him into a cycle of different bodies portraying different themes that majorly affects zits life and understanding of the world. The scene in which Zits meets a boy named Justice develops the theme of betrayal by portraying Justice, who seems like a very wise, trustworthy friend, but ends up betraying Zits which changes his view of the world forever. Flight, by Sherman Alexie, is a book about a homeless†¦show more content†¦I think he subconsciously knew that there would be consequence for his action, that his wife would divorce him, but he didn’t want to believe it. The last question brought up was how can someone stop a cycle of betrayal? A cycle of betrayal can only be stopped by forgiveness. Near the end of the book, when Zits is in his fathers body, he learned that his father did not betray Zits by leaving him and his mother out of spite but for fear of failing his child. When he forgives his father, the cycle of betrayal ends when Zits stops looking for revenge in his father. One possible answer to the question if you were in Jimmys shoes, how would you react to your wife finding out that you betrayed her is that he just is in shock. He thinks about all the betrayals in his life and how he was hurt. How he was damaged and in need of more love. He was surprised that she found out, he thought that she would ne ver know and that there were no consequences for his betrayal even though betrayal in his life has made him suffer. While Zits is watching over Jimmy’s life, Alexie writes, â€Å"He thinks about betrayal†¦ He thinks of how many wives and husbands are cheating on each other. We’re all betraying one another all the time†(120). In this quote, Jimmy is thinking about all the betrayal in the world. All the betrayal that applies to him. Everything that not just happens to him, but also to everyoneShow MoreRelatedAnalysis Of Flight By Sherman Alexie818 Words   |  4 PagesThe book Flight by Sherman Alexie is about a 15 year-old boy named Zits. His Irish mother dies of breast cancer when he is young and his Native American alcoholic father runs away. He has lived in 20 different foster homes and has gone to 22 different schools. Zits had a very rough childhood which has led him to be a troublemaker. Later in the story he shoots up a bank and then gets shot. As a result of his death, he goes on a â€Å"flight† and lives through parts of people’s lives who’ve experiencedRead MoreThe, The Glass Castle By Jeannette Walls, And Flight By Sherman Alexie1466 Words   |  6 Pagesthese are the traits of the American dream. Although, in one s mind a specific picture forms when reading about the American dream this does not mean everyone is seeing the same landscape. A prevalent theme in The Joy Luck Club by Amy Tan, The Glass Castle by Jeannette Walls, and Flight by Sherman Alexie is the potency and prevalence of diversity on the American dream. In each of these compelling works, connoisseurs get a taste of life from different demographics’ viewpoints and a measure of what itRead MoreThe, The Glass Castle By Jeannette Walls, And Flight By Sherman Alexie1441 Words   |  6 Pagesthese are the traits of the American dream. Although, in one s mind a specific picture forms when reading about the American dream this does not mean everyone is seeing the same landscape. A prevalent theme in The Joy Luck Club by Amy Tan, The Glass Castle by Jeannette Walls, and Flight by Sherman Alexie is the potency and prevalence of diversity on the American dream. In each of these compelling works, connoisseurs get a taste of life from different demographics’ viewpoints and a measure of what it

Sunday, December 15, 2019

Don’t Judge a Book by Its Cover Free Essays

Don’t Judge A Book By Its Cover Have you ever been judge just from your appearance? Well I have, so many times. I believe that everyone shouldn’t be judge by their looks, get to know them first. Everyone must have at least heard the quote, â€Å"don’t judge a book by its cover,† because it’s just the same thing, don’t judge a person by its appearance. We will write a custom essay sample on Don’t Judge a Book by Its Cover or any similar topic only for you Order Now People have been judge by their race and who they are. You should at least ask, or get to know them first before you start saying something. All around, I hear or see, most Asians are being ask by this question; â€Å"Are you Chinese? Just because I’m Asian doesn’t mean I’m Chinese. Asians have a lot of different race that I can’t even name all of them. People would come to you and say something in a different language. You’ll say something back like, â€Å"Hello, I’m not Chinese,† or â€Å"Hello I’m not Korean. † Well whatever language they are trying to say to you other then your own language. To me, I think they’re just making fun of you because they have no life. I see it happens a lot to me, but not just only me but to those who are like me. You would hear this a lot at this school, but it’s not true. Everybody, well most people, would be saying, â€Å"Asians are smart. † Just because I’m â€Å"Asian† doesn’t make me smart. Not all Asians are smart, trust me. Everyone is equal in different ways, but you just don’t see it with the people you might hang out with. They also think that all Asians are good at math. I think they are but some are not. I’m not that good at math, but it’s still easy to me. Do you think Asians are rich? Well I don’t think so; I think that most Asians are just like any other regular person that you see trying to support a family. That’s one of the goals that most Asians wants to succeed. Well, that’s everyone’s goal that actually cares. Not only Asians are the only one that are being judge by their appearance or race, but some Hispanics too. Just because they’re Hispanic doesn’t mean they â€Å"cross the border. † Just because they’re white doesn’t mean they have to be tall and that Asians are short. Like for example, me, even though I’m skinny doesn’t make me anorexic because I know I eat a lot. If you’re smart in academics, it doesn’t make you a nerd. Just be you. Overall, from my prospective, everywhere you go, you see someone is being judge. They just think they are all so funny, thinking they’re so cool, and trying to get everyone’s attention. Think about others while you at it because you don’t know how that person might feel when you say those kinds of things. People would judge you too, but why would you have to do it bad. Some stuff might be good comments like a compliment, but that person may take it offensive. I believe that you shouldn’t be judge by your looks; like they say, don’t judge a book by its cover. How to cite Don’t Judge a Book by Its Cover, Papers

Friday, December 6, 2019

Online Privacy A Matter of Policy

Question: Describe about the Online Privacy for A Matter of Policy? Answer: Introduction The origin of hacking can be dated back to many years ago. It became a potential harm to the internet users from the 1980. It was used to mean any sort of computing act which was not acceptable to the society and unethical in nature. During the years 1950-1960, there was a certain degree of tolerance which was shown to these hackers because of their potential in programming and designing various types of applications which can intrude into other systems and gather vital data. Hacking is a method of getting access to the personal data of others, with the sole intent of modifying, destroying or using the data for own use. There has been a debate as to who actually is a hacker (Synodinou, 2015). Hackers are the persons with deep knowledge in technology of computers and networking. It might not always be for harming the others systems and data. A hacker with a harmful intent can be termed as an attacker. Black hat is another type of attacker. The security analysts are sometimes known as the white hats. The type of hacking used for defensive purpose is known as White-hat analysis. The various motives of hacking can be like the employees who have been sacked by their companies, wishing to seek revenge and make the company pay (Whitty, 2013). Fig.1: It shows the hacking attacks across the world (Source: https://graphs.net, 2015) Methods of hacking There are various processes in which several hackers try to intrude into others systems, each with different motive (Torok, 2013). The most popular methods used in hacking can be of the following types: Phishing attacks These scams can be of several types. Primarily, the phishing attacks come from Nigeria. These might include various types of criminal activities. We often see various pop-up messages like You have won a tablet. The trick is that it asks for personal information like bank details or using our credit cards (Office, 2015). The payment made online is directly received by the hackers, who use the funds in some illegal activities. These Nigerian scams are known as the 419 scams. They may come in the form of job offers, some people wanting to meet us and we can make some money by clicking on some of the advertisements. Every year thousands of people from various parts of the world, wall prey to these scams and suffer unthinkably. They are totally clueless on where to lodge the complaint (Synodinou, 2015).It is better to use our common sense before we reply to any mail or follow any email instruction. These scams require us to take some quick actions without giving much time to think. Hence, we should read all the terms and conditions carefully and analyze that whether they are practically possible or not. We should not jump into making some online payments or providing any personal information. Trojan horse Trojan horses are types of viruses which are passed on to the systems of the others by the hackers (Temple, 2012). It installs a program on the computer system which can record everything that is being typed on the computer and sends back all the data to the hacker. These programs can also distribute spam emails and attack others computers. The hackers disguise the viruses in the form of some programs. These are called Trojan Horses. The best way of delivering Trojans is to send it as a variation of the phishing emails. There might be some emails in our inboxes which say that they are from reputed companies or banks. They claim that there has been some problem with a particular transaction (Mthembu, 2012). To see in details, we need to open the email attachment. The time we click on the email link, it starts installing a file by itself. One cannot do anything in order to stop the application. Today, on Facebook and Twitter also, we can find same types of scams. It can be in the form of video which a friend posted. When we click on the link, a popup appears which instructs to update the video player. The update file is actually the Trojan. One of the ways to stop the system from getting infected with Trojan is to apply common sense. We also need updated security software installed in our machines. These software detect the Trojans much earlier and prevent them from being installed (Markou, 2014). Drive-by downloads Most of the security software blocks many of these attacks. But, they are not absolutely full proof (Wadhwa et al. 2015).The several programs installed on our computers might have certain loop-holes through which the hackers can slip in several bypass security applications. In order to harm the users machines, the hackers create websites and plant them with viruses. We can go to that site unintentionally if we click on this harmful link and also on social platforms. When we make certain searches on the search engines like Google, Yahoo, etc, there is the possibility that we might end up visiting any of the these malicious links (Makakaba, 2012). There is also a process used by the hackers, in which they pass harmful codes on to the well known and harmless sites. The work of this code is to scan our computer systems and to find any holes in the security systems (Mathews Hunt, 2015).Whenever any loop hole is found, it automatically starts installing the virus. The best way to prevent this is to keep all the software on the system up-to-date. The Microsoft Windows and other system software should be updated every month with the latest drivers (Liu, 2013).There should be regular updating of the network browsers like Chrome, Internet Explorer, Firefox, Safari and others. This installs new application software which can effectively block these attacks. There are some other software which needs to be updated like Adobe Flash Player, Adobe Reader, Java by Oracle and others. If we do not update them, they can make ways for hackers to attack our systems by sending them inscribed invitations. The old-fashioned browsers like Internet Ex plorer 6, Internet Explorer 7 and Internet Explorer 8 should be immediately replaced with more advanced versions (Yan et al. 2015). Password bypass In this system of hacking, the hackers get access to our passwords from the security breaches in the company where we work and also from the websites which we visit. Few websites require us to store our passwords. This can be a dangerous proposition because the recorded password passes on directly to the hacker, who can then intrude into the account of the user. It is also required to give answers to the security questions in various websites. We should provide such a question which cannot be easily guessed (Li et al. 2014). Unprotected usage of Wi-Fi Most of us have Wi-Fi connections at our home today. But, we need to know whether it is encrypted or not. If it is not encrypted, then the hackers can connect to our network. Some of the neighbors can also locate our network, among the lists of networks they can see on their systems. They are able to watch and record our every move on the internet. It is even possible to download illegal content on our machines by using our very own network connection. This might even lead to a criminal offence. It is of utmost importance to us to secure our networks in the best possible way (Li, 2015).The procedure on how to secure our network can be availed from the manual provided with the Wi-Fi Router. Fig.2: It shows the process of attack by a hacker. (Source: https://www.knowbe4.com, 2015) Critical analysis of the methods used to prevent hacking In order to prevent hacking or to minimize it at least, a number of measures can be selected. This assignment seeks to inform about some of them. As the types of attacks are increasing every day, we need to come up with their solutions also. Continuous updating of software The hackers always look out for areas of weakness in the network, where they can intrude instantly. This is why we should regularly update all our major software like Operating System, Security Software, Web Browsers and others (Katos, 2012). We should visit the Microsoft update page and download the recent software patches for the OS. It is to be kept in mind that we should always purchase original operating system and not the pirated ones. The pirated ones cannot be updated adequately from their original websites. Installation of Firewall Firewalls are programs which protect our systems from unauthorized access by the hackers and the various viruses they manufacture. This tool is extremely important in keeping the integrity of our systems intact. It should be monitored from time to time that our firewalls are kept on all the time. These firewalls can also be personalized according to our needs. We can also tune them in order to decide how much data from the internet we want to get into our systems. It is also equally important to update this firewall regularly (Kah Leng, 2015). Fig.3: How a firewall works (Source: https://www.bleepingcomputer.com, 2015) Frequent changing of passwords We need to frequently change the passwords of the websites we visit regularly. It is equally important to design complicated passwords with a variety of characters like alphabets in lower and upper cases, symbols, numbers, etc. This makes it difficult for anybody to guess the passwords with accuracy (Jung et al. 2014). This needs to be done with more priority in the banking and other websites which require sensitive information like credit card details, bank account details and others. If the passwords are altered on a regular basis at certain intervals, then it reduces the chances of hacking to a great extent. Purchasing proper anti-virus software Nowadays, many computers come with pre-installed anti-virus software. But, it may still be necessary to download or purchase original version of antivirus software for more protection. Various companies manufacture these products nowadays like Kaspersky, McAffee, Norton and others (Phippen et al. 2012).These products keep our systems healthy and ensure they run smoothly. An unhealthy computer filled with viruses, are more likely to attacks from the hackers. It is also extremely important to update them regularly. New threats are emerging every day. So, all these software needs regular updating also. Fig.4: The anti-virus software available today (Source: https://askbobrankin.com, 2015) Installation of Anti-spyware and Adware software These are also few of the threats to the modern computers. But, they are probably not as dangerous as the viruses. Adware creates advertisements in our browsers. Whenever we open our browser, it takes us to some malicious pages or opens up pop-ups which when clicked take us to some harmful websites or downloadable programs. This not only, makes the system susceptible to attacks, but also very slow in performance (Furnell et al. 2014). Spyware on the other hand tracks our internet usage and copy our passwords for using them in some illegal activities. The various anti-spyware and adware programs that are available in the market today, secure our computers from all these threats. Deletion of unknown emails It is always prudent, not to click on any links in emails which come from unknown sources. They might contain potentially dangerous software. Many times it is seen that many alluring emails from several sources hit our inbox. But we should never fall for them. Mostly, the Nigerian countries are involved in the email scams. They try to attract people who can become easy victims of all these scams. They ask for making payments to a particular bank account number against which the user will receive a much bigger amount in dollars. Every year, thousands of people across the world fall prey to these scams. They make payments with expectation of getting some more in return. They end up losing the amount paid. They cannot recover the amount as the transaction involves dealing with foreign countries (Excell, 2012). Conclusions In the end, we may say that it is extremely important nowadays to take adequate protections while using our computer systems. Hacking is constantly on the rise. The hackers are also becoming more advanced in technology. They are continuously producing new harmful applications which are causing extreme harm to us. In this dynamic world, nothing is eternal. Hence, the security software we are using today will not be able to block all the attacks that occur in future. Hence it is extremely important to update them on a regular basis. As the security threats are increasing each day, so are the prevention software. So, today we are extremely lucky to have many options to ward off the hackers and the malicious programs they manufacture. Recommendations In order to fight with the social evil known as hacking, we need to follow a few specific set of guidelines. These simple rules and regulations will ensure that we can operate our systems with ease and without any fear of loss or threat to data. The several ways in which we can handle various types of threats to our computers, have been discussed at length in this assignment. There are different solutions available to us for each different types of threat. It is always wise to keep our systems fully updated with the recent software patches and current versions of the anti-virus and spyware. Protection software is to be installed not only in desktop computers, but also in the official systems that we use. Our official systems contain valuable data regarding our work and personal information which we cannot divulge to any outsider. Hence, our systems at office should also be kept updated with the recent software and operating system. There should also be adequate antivirus and spyware protection software. Reference list Excell, D. (2012). Bayesian inference the future of online fraud protection. Computer Fraud Security, 2012(2), pp.8-11. Furnell, S. and Moore, L. (2014). Security literacy: the missing link in today's online society?. Computer Fraud Security, 2014(5), pp.12-18. Furnell, S. and Phippen, A. (2012). Online privacy: a matter of policy?. Computer Fraud Security, 2012(8), pp.12-18. Jung, Y. and Joshi, J. (2014). CPBAC: Property-based access control model for secure cooperation in online social networks. Computers Security, 41, pp.19-39. Kah Leng, T. (2015). Internet defamation and the online intermediary. Computer Law Security Review, 31(1), pp.68-77. Katos, V. (2012). An integrated model for online transactions: illuminating the black box. Information Management Computer Security, 20(3), pp.184-206. Li, J. (2015). Is online media a two-sided market?. Computer Law Security Review, 31(1), pp.99-111. Li, J., Zhao, J. and Zhang, Y. (2014). Certificateless online/offline signcryption scheme. Security Comm. Networks, p.n/a-n/a. Li, Y., Li, Y., Yan, Q. and Deng, R. (2015). Privacy leakage analysis in online social networks. Computers Security, 49, pp.239-254. Liu, Y. (2013). Online Payment Security System. AMR, 756-759, pp.1930-1932. Makakaba, P. (2012). South African regulation of online casinos licensed in a foreign jurisdiction. Computer Law Security Review, 28(4), pp.445-452. Markou, C. (2014). Online penny auctions and the protection of the consumer under EU law. Computer Law Security Review, 30(5), pp.540-559. Mathews Hunt, K. (2015). Gaming the system: Fake online reviews v. consumer law. Computer Law Security Review, 31(1), pp.3-25. Mthembu, M. (2012). High road in regulating online child pornography in South Africa. Computer Law Security Review, 28(4), pp.438-444. Office, R. (2015). Acknowledgement to Reviewers of Robotics in 2014. Robotics, 4(1), pp.23-24. Synodinou, T. (2015). Intermediaries' liability for online copyright infringement in the EU: Evolutions and confusions. Computer Law Security Review, 31(1), pp.57-67. Temple, M. (2012). Online payment security. SecEd. Torok, R. (2013). Developing an explanatory model for the process of online radicalisation and terrorism. Security Informatics, 2(1), p.6. Wadhwa, P. and Bhatia, M. (2015). Measuring Radicalization in Online Social Networks Using Markov Chains. Journal of Applied Security Research, 10(1), pp.23-47. Whitty, M. (2013). Anatomy of the online dating romance scam. Security Journal.